Science.gov

Sample records for digital steganography focusing

  1. Digital holography-based steganography.

    PubMed

    Hamam, Habib

    2010-12-15

    A steganographic method offering a high hiding capacity is presented in which the techniques of digital holography are used to distribute information from a small secret image across the larger pixel field of a cover image. An iterative algorithm is used to design a phase-only or complex hologram from a padded version of the secret image, quantizing this data according to the carrier data bits that are available within the intended cover image. By introducing the hologram data only into low-order bits of larger amplitude cover pixels, the change in the cover image remains imperceptible to the casual observer, with a peak signal-to-noise ratio of >40 dB. PMID:21165128

  2. A robust chaotic algorithm for digital image steganography

    NASA Astrophysics Data System (ADS)

    Ghebleh, M.; Kanso, A.

    2014-06-01

    This paper proposes a new robust chaotic algorithm for digital image steganography based on a 3-dimensional chaotic cat map and lifted discrete wavelet transforms. The irregular outputs of the cat map are used to embed a secret message in a digital cover image. Discrete wavelet transforms are used to provide robustness. Sweldens' lifting scheme is applied to ensure integer-to-integer transforms, thus improving the robustness of the algorithm. The suggested scheme is fast, efficient and flexible. Empirical results are presented to showcase the satisfactory performance of our proposed steganographic scheme in terms of its effectiveness (imperceptibility and security) and feasibility. Comparison with some existing transform domain steganographic schemes is also presented.

  3. Spread spectrum image steganography.

    PubMed

    Marvel, L M; Boncelet, C R; Retter, C T

    1999-01-01

    In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking. PMID:18267522

  4. Digital focusing schlieren imaging

    NASA Astrophysics Data System (ADS)

    Buckner, Benjamin D.; Trolinger, James D.; L'Esperance, Drew

    2015-09-01

    Since its invention in the 19th century, schlieren imaging has been an essential method for studying many aerodynamic effects, particularly convection and shock waves, but the classical method using parabolic mirrors is extremely difficult to set up and very expensive for large fields of view. Focusing schlieren methods have made large- area schlieren more feasible but have tended to be difficult to align and set up, limiting their utility in many applications We recently developed an alternative approach which utilizes recent advances in digital display technology to produce simpler schlieren system that yields similar sensitivity with greater flexibility.

  5. ML detection of steganography

    NASA Astrophysics Data System (ADS)

    Hogan, Mark T.; Hurley, Neil J.; Silvestre, Guenole C. M.; Balado, Felix; Whelan, Kevin M.

    2005-03-01

    Digital steganography is the art of hiding information in multimedia content, such that it remains perceptually and statistically unchanged. The detection of such covert communication is referred to as steganalysis. To date, steganalysis research has focused primarily on either, the extraction of features from a document that are sensitive to the embedding, or the inference of some statistical difference between marked and unmarked objects. In this work, we evaluate the statistical limits of such techniques by developing asymptotically optimal tests (Maximum Likelihood) for a number of side informed embedding schemes. The required probability density functions (pdf) are derived for Dither Modulation (DM) and Distortion-Compensated Dither Modulation (DC-DM/SCS) from an steganalyst's point of view. For both embedding techniques, the pdfs are derived in the presence and absence of a secret dither key. The resulting tests are then compared to a robust blind steganalytic test based on feature extraction. The performance of the tests is evaluated using an integral measure and receiver operating characteristic (ROC) curves.

  6. Steganography: Past, Present, Future

    SciTech Connect

    Judge, J C

    2001-12-01

    Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.

  7. Transform domain steganography with blind source separation

    NASA Astrophysics Data System (ADS)

    Jouny, Ismail

    2015-05-01

    This paper applies blind source separation or independent component analysis for images that may contain mixtures of text, audio, or other images for steganography purposes. The paper focuses on separating mixtures in the transform domain such as Fourier domain or the Wavelet domain. The study addresses the effectiveness of steganography when using linear mixtures of multimedia components and the ability of standard blind sources separation techniques to discern hidden multimedia messages. Mixing in the space, frequency, and wavelet (scale) domains is compared. Effectiveness is measured using mean square error rate between original and recovered images.

  8. The Focusing DIRC with Waveform Digitizing Electronics

    SciTech Connect

    Ruckman, L.L.; Nishimura, K.; Varner, G.S.; Vavra, J.; Aston, D.; Leith, D.W.G.S.; Ratcliff, B.; /SLAC

    2012-06-15

    We have tested a novel Cherenkov imaging detector called the Focusing DIRC (FDIRC) with waveform digitizing electronics. The prototype's concept is based on the BaBar DIRC with several important improvements: (a) much faster, pixelated photon detectors, (b) a mirror that makes the photon detector smaller and less sensitive to background in future applications, and (c) electronics capable of measuring single photon resolution to {sigma} {approx} 150 ps, which allows for correction due to chromatic error. In this test, the prototype has been instrumented with seven Hamamatsu H-8500 MaPMTs. Waveforms from {approx}450 pixels are digitized with waveform sampling electronics based on the BLAB2 ASIC, operating at a sampling speed of {approx}2.5 GSa/s. This version of the FDIRC prototype was tested in a large cosmic ray telescope providing muon tracks with {approx}1 mrad angular resolution and a muon momentum cutoff of {ge} 1.6 GeV/c.

  9. Attacks on lexical natural language steganography systems

    NASA Astrophysics Data System (ADS)

    Taskiran, Cuneyt M.; Topkara, Umut; Topkara, Mercan; Delp, Edward J.

    2006-02-01

    Text data forms the largest bulk of digital data that people encounter and exchange daily. For this reason the potential usage of text data as a covert channel for secret communication is an imminent concern. Even though information hiding into natural language text has started to attract great interest, there has been no study on attacks against these applications. In this paper we examine the robustness of lexical steganography systems.In this paper we used a universal steganalysis method based on language models and support vector machines to differentiate sentences modified by a lexical steganography algorithm from unmodified sentences. The experimental accuracy of our method on classification of steganographically modified sentences was 84.9%. On classification of isolated sentences we obtained a high recall rate whereas the precision was low.

  10. Fourier Phase Domain Steganography: Phase Bin Encoding Via Interpolation

    NASA Astrophysics Data System (ADS)

    Rivas, Edward

    2007-04-01

    In recent years there has been an increased interest in audio steganography and watermarking. This is due primarily to two reasons. First, an acute need to improve our national security capabilities in light of terrorist and criminal activity has driven new ideas and experimentation. Secondly, the explosive proliferation of digital media has forced the music industry to rethink how they will protect their intellectual property. Various techniques have been implemented but the phase domain remains a fertile ground for improvement due to the relative robustness to many types of distortion and immunity to the Human Auditory System. A new method for embedding data in the phase domain of the Discrete Fourier Transform of an audio signal is proposed. Focus is given to robustness and low perceptibility, while maintaining a relatively high capacity rate of up to 172 bits/s.

  11. Digital reverse propagation in focusing Kerr media

    SciTech Connect

    Goy, Alexandre; Psaltis, Demetri

    2011-03-15

    Lenses allow the formation of clear images in homogeneous linear media. Holography is an alternative imaging method, but its use is limited to cases in which it provides an advantage, such as three-dimensional imaging. In nonlinear media, lenses no longer work. The light produces intensity-dependent aberrations. The reverse propagation method used in digital holography to form images from recorded holograms works even in Kerr media [M. Tsang, D. Psaltis, and F. G. Omenetto, Opt. Lett. 28, 1873 (2003).]. The principle has been experimentally demonstrated recently in defocusing media [C. Barsi, W.Wan, and J.W. Fleischer, Nat. Photonics 3, 211 (2009).]. Here, we report experimental results in focusing media.

  12. Challenging the doctrines of JPEG steganography

    NASA Astrophysics Data System (ADS)

    Holub, Vojtech; Fridrich, Jessica

    2014-02-01

    The design of both steganography and steganalysis methods for digital images heavily relies on empirically justified principles. In steganography, the domain in which the embedding changes are executed is usually the preferred domain in which to measure the statistical impact of embedding (to construct the distortion function). Another principle almost exclusively used in steganalysis states that the most accurate detection is obtained when extracting the steganalysis features from the embedding domain. While a substantial body of prior art seems to support these two doctrines, this article challenges both principles when applied to the JPEG format. Through a series of targeted experiments on numerous older as well as current steganographic algorithms, we lay out arguments for why measuring the embedding distortion in the spatial domain can be highly beneficial for JPEG steganography. Moreover, as modern embedding algorithms avoid introducing easily detectable artifacts in the statistics of quantized DCT coefficients, we demonstrate that more accurate detection is obtained when constructing the steganalysis features in the spatial domain where the distortion function is minimized, challenging thus both established doctrines.

  13. Is image steganography natural?

    PubMed

    Martín, Alvaro; Sapiro, Guillermo; Seroussi, Gadiel

    2005-12-01

    Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. We experimentally investigate if stego-images, bearing a secret message, are statistically "natural." For this purpose, we use recent results on the statistics of natural images and investigate the effect of some popular steganography techniques. We found that these fundamental statistics of natural images are, in fact, generally altered by the hidden "nonnatural" information. Frequently, the change is consistently biased in a given direction. However, for the class of natural images considered, the change generally falls within the intrinsic variability of the statistics, and, thus, does not allow for reliable detection, unless knowledge of the data hiding process is taken into account. In the latter case, significant levels of detection are demonstrated. PMID:16370457

  14. Digital microscopy. Bringing new technology into focus.

    PubMed

    2010-06-01

    Digital microscopy enables the scanning of microscope slides so that they can be viewed, analyzed, and archived on a computer. While the technology is not yet widely accepted by pathologists, a switch to digital microscopy systems seems to be inevitable in the near future. PMID:21309285

  15. Digital radiography: a focus on clinical utility

    SciTech Connect

    Price, R.R.; Rollo, F.D.; Monahan, W.G.; James, A.E. Jr.

    1982-01-01

    This book is interesting and timely in that it covers the new and exciting area of digital radiography. The book begins with chapters on the physics, instrumentation, and terminology of digital radiography. Then cost-benefit ratios, legal implication, and outpatient vs. inpatient studies are discussed. The clinical chapters follow. These are applicable to the head and neck, heart, lungs, kidneys, peripheral arteries, and pediatric population. Discussion then centers on intraarterial digital subtraction, clinical experience at Wisconsin, nonangiography application of digital radiology in children, and analog film-screen subtraction intravenous angiography. The book ends by briefly discussing microwave imaging, nuclear magnetic resonance, emission tomography, real-time and Doppler sonography, analog tomography, and the future photoelectric radiology department.

  16. Taxonomy for spatial domain LSB steganography techniques

    NASA Astrophysics Data System (ADS)

    Collins, James C.; Agaian, Sos S.

    2014-05-01

    The Least Significant Bit (LSB) embedding technique is a well-known and broadly employed method in multimedia steganography, used mainly in applications involving single bit-plane manipulations in the spatial domain [1]. The key advantages of LSB procedures are they are simple to understand, easy to implement, have high embedding capacity, and can be resistant to steganalysis attacks. Additionally, the LSB approach has spawned numerous applications and can be used as the basis of more complex techniques for multimedia data embedding. In the last several decades, hundreds of new LSB or LSB variant methods have been developed in an effort to optimize capacity while minimizing detectability, taking advantage of the overall simplicity of this method. LSB-steganalysis research has also intensified in an effort to find new or improved ways to evaluate the performance of this widely used steganographic system. This paper reviews and categorizes some of these major techniques of LSB embedding, focusing specifically on the spatial domain. Some justification for establishing and identifying promising uses of a proposed SD-LSB centric taxonomy are discussed. Specifically, we define a new taxonomy for SD-LSB embedding techniques with the goal of aiding researchers in tool classification methodologies that can lead to advances in the state-of-the-art in steganography. With a common framework to work with, researchers can begin to more concretely identify core tools and common techniques to establish common standards of practice for steganography in general. Finally, we provide a summary on some of the most common LSB embedding techniques followed by a proposed taxonomy standard for steganalysis.

  17. Steganography in arrhythmic electrocardiogram signal.

    PubMed

    Edward Jero, S; Ramu, Palaniappan; Ramakrishnan, S

    2015-08-01

    Security and privacy of patient data is a vital requirement during exchange/storage of medical information over communication network. Steganography method hides patient data into a cover signal to prevent unauthenticated accesses during data transfer. This study evaluates the performance of ECG steganography to ensure secured transmission of patient data where an abnormal ECG signal is used as cover signal. The novelty of this work is to hide patient data into two dimensional matrix of an abnormal ECG signal using Discrete Wavelet Transform and Singular Value Decomposition based steganography method. A 2D ECG is constructed according to Tompkins QRS detection algorithm. The missed R peaks are computed using RR interval during 2D conversion. The abnormal ECG signals are obtained from the MIT-BIH arrhythmia database. Metrics such as Peak Signal to Noise Ratio, Percentage Residual Difference, Kullback-Leibler distance and Bit Error Rate are used to evaluate the performance of the proposed approach. PMID:26736533

  18. An Approach to Textual Steganography

    NASA Astrophysics Data System (ADS)

    Morran, Michael; Weir, George R. S.

    Textual steganography is a means of concealing an encoded message within text. The appeal in such a system is its potential for hiding the fact that encoding is taking place. The failure to hide the presence of encoding is a form of information leakage and an inherent risk since it suggests that there is important or valuable information in transit. This is considered a major limitation of existing cryptographic techniques as applied to secure information transfer. In this paper, we describe an experimental system that we have developed as a test bed for textual steganography. This system allows us to explore the application of part of speech tagging, word sense disambiguation and synonym replacement as component strategies for textual steganography.

  19. Lessons Learned From Using Focus Groups to Refine Digital Interventions

    PubMed Central

    Avis, Jillian LS; van Mierlo, Trevor; Fournier, Rachel

    2015-01-01

    There is growing interest in applying novel eHealth approaches for the prevention and management of various health conditions, with the ultimate goal of increasing positive patient outcomes and improving the effectiveness and efficiency of health services delivery. Coupled with the use of innovative approaches is the possibility for adverse outcomes, highlighting the need to strategically refine digital practices prior to implementation with patients. One appropriate method for modification purposes includes focus groups. Although it is a well-established method in qualitative research, there is a lack of guidance regarding the use of focus groups for digital intervention refinement. To address this gap, the purpose of our paper is to highlight several lessons our research team has learned in using focus groups to help refine digital interventions prior to use with patients. PMID:26232313

  20. A Novel Strategy for Quantum Image Steganography Based on Moiré Pattern

    NASA Astrophysics Data System (ADS)

    Jiang, Nan; Wang, Luo

    2015-03-01

    Image steganography technique is widely used to realize the secrecy transmission. Although its strategies on classical computers have been extensively researched, there are few studies on such strategies on quantum computers. Therefore, in this paper, a novel, secure and keyless steganography approach for images on quantum computers is proposed based on Moiré pattern. Algorithms based on the Moiré pattern are proposed for binary image embedding and extraction. Based on the novel enhanced quantum representation of digital images (NEQR), recursive and progressively layered quantum circuits for embedding and extraction operations are designed. In the end, experiments are done to verify the validity and robustness of proposed methods, which confirms that the approach in this paper is effective in quantum image steganography strategy.

  1. Focusing through dynamic tissue with millisecond digital optical phase conjugation

    PubMed Central

    Wang, Daifa; Zhou, Edward Haojiang; Brake, Joshua; Ruan, Haowen; Jang, Mooseok; Yang, Changhuei

    2015-01-01

    Digital optical phase conjugation (DOPC) is a new technique employed in wavefront shaping and phase conjugation for focusing light through or within scattering media such as biological tissues. DOPC is particularly attractive as it intrinsically achieves a high fluence reflectivity in comparison to nonlinear optical approaches. However, the slow refresh rate of liquid crystal spatial light modulators and limitations imposed by computer data transfer speeds have thus far made it difficult for DOPC to achieve a playback latency of shorter than ~200 ms and, therefore, prevented DOPC from being practically applied to thick living samples. In this paper, we report a novel DOPC system that is capable of 5.3 ms playback latency. This speed improvement of almost 2 orders of magnitude is achieved by using a digital micromirror device, field programmable gate array (FPGA) processing, and a single-shot binary phase retrieval technique. With this system, we are able to focus through 2.3 mm living mouse skin with blood flowing through it (decorrelation time ~30 ms) and demonstrate that the focus can be maintained indefinitely—an important technological milestone that has not been previously reported, to the best of our knowledge. PMID:26677458

  2. A high capacity 3D steganography algorithm.

    PubMed

    Chao, Min-Wen; Lin, Chao-hung; Yu, Cheng-Wei; Lee, Tong-Yee

    2009-01-01

    In this paper, we present a very high-capacity and low-distortion 3D steganography scheme. Our steganography approach is based on a novel multilayered embedding scheme to hide secret messages in the vertices of 3D polygon models. Experimental results show that the cover model distortion is very small as the number of hiding layers ranges from 7 to 13 layers. To the best of our knowledge, this novel approach can provide much higher hiding capacity than other state-of-the-art approaches, while obeying the low distortion and security basic requirements for steganography on 3D models. PMID:19147891

  3. Effective Electrocardiogram Steganography Based on Coefficient Alignment.

    PubMed

    Yang, Ching-Yu; Wang, Wen-Fong

    2016-03-01

    This study presents two types of data hiding methods based on coefficient alignment for electrocardiogram (ECG) signals, namely, lossy and reversible ECG steganographys. The lossy method is divided into high-quality and high-capacity ECG steganography, both of which are capable of hiding confidential patient data in ECG signals. The reversible data hiding method can not only hide secret messages but also completely restore the original ECG signal after bit extraction. Simulations confirmed that the perceived quality generated by the lossy ECG steganography methods was good, while hiding capacity was acceptable. In addition, these methods have a certain degree of robustness, which is rare in conventional ECG stegangraphy schemes. Moreover, the proposed reversible ECG steganography method can not only successfully extract hidden messages but also completely recover the original ECG data. PMID:26711443

  4. Steganography using reversible texture synthesis.

    PubMed

    Wu, Kuo-Chen; Wang, Chung-Ming

    2015-01-01

    We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages. In contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image and embeds secret messages through the process of texture synthesis. This allows us to extract the secret messages and source texture from a stego synthetic texture. Our approach offers three distinct advantages. First, our scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, a steganalytic algorithm is not likely to defeat our steganographic approach. Third, the reversible capability inherited from our scheme provides functionality, which allows recovery of the source texture. Experimental results have verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source texture. PMID:25415988

  5. A secure steganography for privacy protection in healthcare system.

    PubMed

    Liu, Jing; Tang, Guangming; Sun, Yifeng

    2013-04-01

    Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works. PMID:23321975

  6. Steganography based on pixel intensity value decomposition

    NASA Astrophysics Data System (ADS)

    Abdulla, Alan Anwar; Sellahewa, Harin; Jassim, Sabah A.

    2014-05-01

    This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is proposed to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding purposes. The proposed decomposition has a desirable property whereby the sum of all bit-planes does not exceed the maximum pixel intensity value, i.e. 255. Experimental results demonstrate that the proposed technique offers an effective compromise between payload capacity and stego quality of existing embedding techniques based on pixel intensity value decomposition. Its capacity is equal to that of binary and Lucas, while it offers a higher capacity than Fibonacci, Prime, Natural, and CF when the secret bits are embedded in 1st Least Significant Bit (LSB). When the secret bits are embedded in higher bit-planes, i.e., 2nd LSB to 8th Most Significant Bit (MSB), the proposed scheme has more capacity than Natural numbers based embedding. However, from the 6th bit-plane onwards, the proposed scheme offers better stego quality. In general, the proposed decomposition scheme has less effect in terms of quality on pixel value when compared to most existing pixel intensity value decomposition techniques when embedding messages in higher bit-planes.

  7. Digital evidence obfuscation: recovery techniques

    NASA Astrophysics Data System (ADS)

    Craiger, J. Philip; Swauger, Jeff; Marberry, Chris

    2005-05-01

    Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes. Hiding files on a computer can take on many forms, from file names and extensions to more technical methods such as encryption and steganography. Encryption and steganography have the potential to severely impede the recovery of digital evidence. We discuss encryption and steganography below and describe potential methods of coping with each. The techniques we discuss require no special knowledge or advanced hardware or software; however, the use of these techniques does not guarantee the recovery of obfuscated information.

  8. Mel-cepstrum-based steganalysis for VoIP steganography

    NASA Astrophysics Data System (ADS)

    Kraetzer, Christian; Dittmann, Jana

    2007-02-01

    Steganography and steganalysis in VoIP applications are important research topics as speech data is an appropriate cover to hide messages or comprehensive documents. In our paper we introduce a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages. In particular we combine known and established audio steganalysis features with the features derived from Melcepstrum based analysis for an investigation on the improvement of the detection performance. Our main focus considers the application environment of VoIP-steganography scenarios. The evaluation of the enhanced feature space is performed for classical steganographic as well as for watermarking algorithms. With this strategy we show how general forensic approaches can detect information hiding techniques in the field of hidden communication as well as for DRM applications. For the later the detection of the presence of a potential watermark in a specific feature space can lead to new attacks or to a better design of the watermarking pattern. Following that the usefulness of Mel-cepstrum domain based features for detection is discussed in detail.

  9. Blind Linguistic Steganalysis against Translation Based Steganography

    NASA Astrophysics Data System (ADS)

    Chen, Zhili; Huang, Liusheng; Meng, Peng; Yang, Wei; Miao, Haibo

    Translation based steganography (TBS) is a kind of relatively new and secure linguistic steganography. It takes advantage of the "noise" created by automatic translation of natural language text to encode the secret information. Up to date, there is little research on the steganalysis against this kind of linguistic steganography. In this paper, a blind steganalytic method, which is named natural frequency zoned word distribution analysis (NFZ-WDA), is presented. This method has improved on a previously proposed linguistic steganalysis method based on word distribution which is targeted for the detection of linguistic steganography like nicetext and texto. The new method aims to detect the application of TBS and uses none of the related information about TBS, its only used resource is a word frequency dictionary obtained from a large corpus, or a so called natural frequency dictionary, so it is totally blind. To verify the effectiveness of NFZ-WDA, two experiments with two-class and multi-class SVM classifiers respectively are carried out. The experimental results show that the steganalytic method is pretty promising.

  10. Comparison of digital focus criteria for a TV microscope system.

    PubMed

    Harms, H; Aus, H M

    1984-05-01

    Existing focusing methods, such as standard deviation of gray values, gradients, information content of the image and the lateral inhibition function, were compared, and a new combination criterion was developed. This combined method consists of using the standard deviation of the image for coarse focusing followed by a modified form of the lateral inhibition for the fine focus. The lateral inhibitor model of the eye is a recursive filter that can be simplified to a nonrecursive filtering algorithm, as postulated by Rechenberg. The reported focus method operates over a focusing range (z-axis) of +/- 300 micron and is accurate within +/- 0.1 micron in the transmission, dark-field, and phase contrast microscope. PMID:6375998

  11. Digitally Oriented Materials”: Focus on Lithium Disilicate Ceramics

    PubMed Central

    Ferrari, Marco; Mangano, Francesco Guido; Sorrentino, Roberto

    2016-01-01

    The present paper was aimed at reporting the state of the art about lithium disilicate ceramics. The physical, mechanical, and optical properties of this material were reviewed as well as the manufacturing processes, the results of in vitro and in vivo investigations related to survival and success rates over time, and hints for the clinical indications in the light of the latest literature data. Due to excellent optical properties, high mechanical resistance, restorative versatility, and different manufacturing techniques, lithium disilicate can be considered to date one of the most promising dental materials in Digital Dentistry.

  12. Steganography and encrypting based on immunochemical systems.

    PubMed

    Kim, Kyung-Woo; Bocharova, Vera; Halámek, Jan; Oh, Min-Kyu; Katz, Evgeny

    2011-05-01

    Steganography and encrypting were demonstrated with immuno-specific systems. IgG-proteins were used as invisible ink developed with complementary antibodies labeled with enzymes producing color spots. The information security was achieved by mixing the target protein-antigens used for the text encoding with masking proteins of similar composition but having different bioaffinity. Two different texts were simultaneously encoded by using two different encoding proteins in a mixture. Various encrypting techniques were exemplified with the immuno-systems used for the steganography. Future use of the developed approach for information protection and watermark-technology was proposed. Scaling down the encoded text to a micro-size is feasible with the use of nanotechnology. PMID:21449025

  13. LSB Based Quantum Image Steganography Algorithm

    NASA Astrophysics Data System (ADS)

    Jiang, Nan; Zhao, Na; Wang, Luo

    2016-01-01

    Quantum steganography is the technique which hides a secret message into quantum covers such as quantum images. In this paper, two blind LSB steganography algorithms in the form of quantum circuits are proposed based on the novel enhanced quantum representation (NEQR) for quantum images. One algorithm is plain LSB which uses the message bits to substitute for the pixels' LSB directly. The other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The extracting circuits can regain the secret message only according to the stego cover. Analysis and simulation-based experimental results demonstrate that the invisibility is good, and the balance between the capacity and the robustness can be adjusted according to the needs of applications.

  14. Real-time object tracking for moving target auto-focus in digital camera

    NASA Astrophysics Data System (ADS)

    Guan, Haike; Niinami, Norikatsu; Liu, Tong

    2015-02-01

    Focusing at a moving object accurately is difficult and important to take photo of the target successfully in a digital camera. Because the object often moves randomly and changes its shape frequently, position and distance of the target should be estimated at real-time so as to focus at the objet precisely. We propose a new method of real-time object tracking to do auto-focus for moving target in digital camera. Video stream in the camera is used for the moving target tracking. Particle filter is used to deal with problem of the target object's random movement and shape change. Color and edge features are used as measurement of the object's states. Parallel processing algorithm is developed to realize real-time particle filter object tracking easily in hardware environment of the digital camera. Movement prediction algorithm is also proposed to remove focus error caused by difference between tracking result and target object's real position when the photo is taken. Simulation and experiment results in digital camera demonstrate effectiveness of the proposed method. We embedded real-time object tracking algorithm in the digital camera. Position and distance of the moving target is obtained accurately by object tracking from the video stream. SIMD processor is applied to enforce parallel real-time processing. Processing time less than 60ms for each frame is obtained in the digital camera with its CPU of only 162MHz.

  15. Simultaneous depth determination of multiple objects by focus analysis in digital holography

    SciTech Connect

    Tachiki, Mark L.; Itoh, Masahide; Yatagai, Toyohiko

    2008-07-01

    Focus analysis techniques from computer vision are applied to digital holography to determine the depth (range) of multiple objects and their surfaces from a single hologram capture. With this method the depths of objects can be determined from a single hologram capture without the need for manual focusing and without prior information on object location. Variance and the Laplacian of Gaussian are analyzed as focus measures, and techniques are proposed for focus plane determination from the focus measure curves. The algorithm is described in detail and demonstrated through simulation and optical experiment.

  16. A pattern recognition system for JPEG steganography detection

    NASA Astrophysics Data System (ADS)

    Chen, C. L. Philip; Chen, Mei-Ching; Agaian, Sos; Zhou, Yicong; Roy, Anuradha; Rodriguez, Benjamin M.

    2012-10-01

    This paper builds up a pattern recognition system to detect anomalies in JPEG images, especially steganographic content. The system consists of feature generation, feature ranking and selection, feature extraction, and pattern classification. These processes tend to capture image characteristics, reduce the problem dimensionality, eliminate the noise inferences between features, and further improve classification accuracies on clean and steganography JPEG images. Based on the discussion and analysis of six popular JPEG steganography methods, the entire recognition system results in higher classification accuracies between clean and steganography classes compared to merely using individual feature subset for JPEG steganography detection. The strength of feature combination and preprocessing has been integrated even when a small amount of information is embedded. The work demonstrated in this paper is extensible and can be improved by integrating various new and current techniques.

  17. Efficient high-capacity steganography technique

    NASA Astrophysics Data System (ADS)

    Abdulla, Alan A.; Jassim, Sabah A.; Sellahewa, Harin

    2013-05-01

    Performance indicators characterizing modern steganographic techniques include capacity (i.e. the quantity of data that can be hidden in the cover medium), stego quality (i.e. artifacts visibility), security (i.e. undetectability), and strength or robustness (intended as the resistance against active attacks aimed to destroy the secret message). Fibonacci based embedding techniques have been researched and proposed in the literature to achieve efficient steganography in terms of capacity with respect to stego quality. In this paper, we investigated an innovative idea that extends Fibonacci-like steganography by bit-plane(s) mapping instead of bit-plane(s) replacement. Our proposed algorithm increases embedding capacity using bit-plane mapping to embed two bits of the secret message in three bits of a pixel of the cover, at the expense of a marginal loss in stego quality. While existing Fibonacci embedding algorithms do not use certain intensities of the cover for embedding due to the limitation imposed by the Zeckendorf theorem, our proposal solve this problem and make all intensity values candidates for embedding. Experimental results demonstrate that the proposed technique double the embedding capacity when compared to existing Fibonacci methods, and it is secure against statistical attacks such as RS, POV, and difference image histogram (DIH).

  18. State-of-the-art soft computing techniques in image steganography domain

    NASA Astrophysics Data System (ADS)

    Hussain, Hanizan Shaker; Din, Roshidi; Samad, Hafiza Abdul; Yaacub, Mohd Hanafizah; Murad, Roslinda; Rukhiyah, A.; Sabdri, Noor Maizatulshima

    2016-08-01

    This paper reviews major works of soft computing (SC) techniques in image steganography and watermarking in the last ten years, focusing on three main SC techniques, which are neural network, genetic algorithm, and fuzzy logic. The findings suggests that all these works applied SC techniques either during pre-processing, embedding or extracting stages or more than one of these stages. Therefore, the presence of SC techniques with their diverse approaches and strengths can help researchers in future work to attain excellent quality of image information hiding that comprises both imperceptibility and robustness.

  19. Pattern based 3D image Steganography

    NASA Astrophysics Data System (ADS)

    Thiyagarajan, P.; Natarajan, V.; Aghila, G.; Prasanna Venkatesan, V.; Anitha, R.

    2013-03-01

    This paper proposes a new high capacity Steganographic scheme using 3D geometric models. The novel algorithm re-triangulates a part of a triangle mesh and embeds the secret information into newly added position of triangle meshes. Up to nine bits of secret data can be embedded into vertices of a triangle without causing any changes in the visual quality and the geometric properties of the cover image. Experimental results show that the proposed algorithm is secure, with high capacity and low distortion rate. Our algorithm also resists against uniform affine transformations such as cropping, rotation and scaling. Also, the performance of the method is compared with other existing 3D Steganography algorithms. [Figure not available: see fulltext.

  20. Compact touchless fingerprint reader based on digital variable-focus liquid lens

    NASA Astrophysics Data System (ADS)

    Tsai, C. W.; Wang, P. J.; Yeh, J. A.

    2014-09-01

    Identity certification in the cyberworld has always been troublesome if critical information and financial transaction must be processed. Biometric identification is the most effective measure to circumvent the identity issues in mobile devices. Due to bulky and pricy optical design, conventional optical fingerprint readers have been discarded for mobile applications. In this paper, a digital variable-focus liquid lens was adopted for capture of a floating finger via fast focusplane scanning. Only putting a finger in front of a camera could fulfill the fingerprint ID process. This prototyped fingerprint reader scans multiple focal planes from 30 mm to 15 mm in 0.2 second. Through multiple images at various focuses, one of the images is chosen for extraction of fingerprint minutiae used for identity certification. In the optical design, a digital liquid lens atop a webcam with a fixed-focus lens module is to fast-scan a floating finger at preset focus planes. The distance, rolling angle and pitching angle of the finger are stored for crucial parameters during the match process of fingerprint minutiae. This innovative compact touchless fingerprint reader could be packed into a minute size of 9.8*9.8*5 (mm) after the optical design and multiple focus-plane scan function are optimized.

  1. Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images.

    PubMed

    Mantos, Petros L K; Maglogiannis, Ilias

    2016-06-01

    The exchange of medical images over the Internet has evoked significant interest over the past few years due to the introduction of web and cloud based medical information systems. The protection of sensitive data has always been a key indicator in the performance of such systems. In this context, this work presents an algorithm developed for Digital Imaging and Communications in Medicine (DICOM) medical images, which applies secret-sharing steganography methods for ensuring the integrity of sensitive patient data as well as the important parts of the image. In the proposed algorithm, images are divided into two parts: the region of interest (ROI) and the region of non interest (RONI). Patient data and integrity hashes are positioned inside the ROI while the information (map) needed to recover the ROI before insertion is positioned in the RONI. Security of the extraction process is assured through the use of cryptography. The experimental results prove that the original (cover) images and the stego images provide an excellent visual equality result in terms of PSNR. Furthermore, they prove that the proposed scheme can be efficiently used as a steganography scheme in DICOM images with limited smooth areas. PMID:27167526

  2. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-04-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  3. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  4. Robust, real-time, digital focusing for FD-OCM using ISAM on a GPU

    NASA Astrophysics Data System (ADS)

    St. Marie, Luke R.; An, Fangzhao A.; Corso, Anthony L.; Grasel, John T.; Haskell, Richard C.

    2014-03-01

    Frequency domain optical coherence tomography (FD-OCT) achieves high image acquisition speeds by probing all depths of a sample simultaneously. However, the tightly focused beam required for frequency domain optical coherence microscopy (FD-OCM) produces images with poor lateral resolution at depths away from the beam waist. The new technique of interferometric synthetic aperture microscopy (ISAM) can digitally focus these poorly resolved FD-OCM images, resulting in uniform lateral resolution throughout the sample volume equivalent to that in the plane of focus of the incident beam. While ISAM is computationally intensive, we demonstrate that an ISAM implementation using Nvidia's parallel Compute Unified Device Architecture (CUDA) can achieve real-time focusing using a mid-range Nvidia GPU. The time required for digital focusing scales linearly with image size, at a rate of about 10 nanoseconds per voxel. This makes possible real-time FD-OCM. For example, a 3-D image (512 x 512 x 128 voxels) with crosssection 1.2 mm x 1.2 mm and 200 micron depth requires 17 seconds to acquire with a 100 kHz A-scan rate (and 6 repeated x-scans for motion sensitivity), but only 360 milliseconds to focus with ISAM. This example image is simulated with a numerical aperture (NA) of 0.07, so that the 200 micron depth represents four Rayleigh ranges (+/- 2 Rayleigh ranges from the focal plane). In addition, our simulations indicate that ISAM performs well with very noisy input data. Even with noise levels as high as 50%, ISAM produces focused images with signal-to-noise ratios of over 100. ISAM-focusing is both fast and robust.

  5. An optimized ultrasound digital beamformer with dynamic focusing implemented on FPGA.

    PubMed

    Almekkawy, Mohamed; Xu, Jingwei; Chirala, Mohan

    2014-01-01

    We present a resource-optimized dynamic digital beamformer for an ultrasound system based on a field-programmable gate array (FPGA). A comprehensive 64-channel receive beamformer with full dynamic focusing is embedded in the Altera Arria V FPGA chip. To improve spatial and contrast resolution, full dynamic beamforming is implemented by a novel method with resource optimization. This was conceived using the implementation of the delay summation through a bulk (coarse) delay and fractional (fine) delay. The sampling frequency is 40 MHz and the beamformer includes a 240 MHz polyphase filter that enhances the temporal resolution of the system while relaxing the Analog-to-Digital converter (ADC) bandwidth requirement. The results indicate that our 64-channel dynamic beamformer architecture is amenable for a low power FPGA-based implementation in a portable ultrasound system. PMID:25570695

  6. Amplifier Noise Based Optical Steganography with Coherent Detection

    NASA Astrophysics Data System (ADS)

    Wu, Ben; Chang, Matthew P.; Caldwell, Naomi R.; Caldwell, Myles E.; Prucnal, Paul R.

    2014-12-01

    We summarize the principle and experimental setup of optical steganography based on amplified spontaneous emission (ASE) noise. Using ASE noise as the signal carrier, optical steganography effectively hides a stealth channel in both the time domain and the frequency domain. Coherent detection is used at the receiver of the stealth channel. Because ASE noise has short coherence length and random phase, it only interferes with itself within a very short range. Coherent detection requires the stealth transmitter and stealth receiver to precisely match the optical delay,which generates a large key space for the stealth channel. Several methods to further improve optical steganography, signal to noise ratio, compatibility with the public channel, and applications of the stealth channel are also summarized in this review paper.

  7. Digital focusing of OCT images based on scalar diffraction theory and information entropy

    PubMed Central

    Liu, Guozhong; Zhi, Zhongwei; Wang, Ruikang K.

    2012-01-01

    This paper describes a digital method that is capable of automatically focusing optical coherence tomography (OCT) en face images without prior knowledge of the point spread function of the imaging system. The method utilizes a scalar diffraction model to simulate wave propagation from out-of-focus scatter to the focal plane, from which the propagation distance between the out-of-focus plane and the focal plane is determined automatically via an image-definition-evaluation criterion based on information entropy theory. By use of the proposed approach, we demonstrate that the lateral resolution close to that at the focal plane can be recovered from the imaging planes outside the depth of field region with minimal loss of resolution. Fresh onion tissues and mouse fat tissues are used in the experiments to show the performance of the proposed method. PMID:23162717

  8. SFM Technique and Focus Stacking for Digital Documentation of Archaeological Artifacts

    NASA Astrophysics Data System (ADS)

    Clini, P.; Frapiccini, N.; Mengoni, M.; Nespeca, R.; Ruggeri, L.

    2016-06-01

    Digital documentation and high-quality 3D representation are always more requested in many disciplines and areas due to the large amount of technologies and data available for fast, detailed and quick documentation. This work aims to investigate the area of medium and small sized artefacts and presents a fast and low cost acquisition system that guarantees the creation of 3D models with an high level of detail, making the digitalization of cultural heritage a simply and fast procedure. The 3D models of the artefacts are created with the photogrammetric technique Structure From Motion that makes it possible to obtain, in addition to three-dimensional models, high-definition images for a deepened study and understanding of the artefacts. For the survey of small objects (only few centimetres) it is used a macro lens and the focus stacking, a photographic technique that consists in capturing a stack of images at different focus planes for each camera pose so that is possible to obtain a final image with a higher depth of field. The acquisition with focus stacking technique has been finally validated with an acquisition with laser triangulation scanner Minolta that demonstrates the validity compatible with the allowable error in relation to the expected precision.

  9. Quantum Steganography via Greenberger-Horne-Zeilinger GHZ4 State

    NASA Astrophysics Data System (ADS)

    A. El, Allati; M. B. Ould, Medeni; Hassouni, Y.

    2012-04-01

    A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ4 state is constructed to investigate the possibility of remotely transferred hidden information. Moreover, the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information. Then, the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users. After insuring the security of the quantum channel, they begin to hide the secret information in the cover of message. Comparing the scheme with the previous quantum steganographies, capacity and imperceptibility of hidden message are good. The security of the present scheme against many attacks is also discussed.

  10. Real-time, auto-focusing digital holographic microscope using graphics processors.

    PubMed

    Doğar, Mert; İlhan, Hazar A; Özcan, Meriç

    2013-08-01

    The most significant advantage of holographic imaging is that one does not need to do focusing alignment for the scene or objects while capturing their images. To focus on a particular object recorded in a digital hologram, a post-processing on the recorded image must be performed. This post-processing, so called the reconstruction, is essentially the calculation of wave propagation in free space. If the object's optical distance to the recording plane is not known a priori, focusing methods are used to estimate this distance. However, these operations can be quite time consuming as the hologram sizes increase. When there is a time constraint on these procedures and the image resolution is high, traditional central processing units (CPUs) can no longer satisfy the desired reconstruction speeds. Then, especially for real-time operations, additional hardware accelerators are required for reconstructing high resolution holograms. To this extend, today's commercial graphic cards offer a viable solution, as the holograms can be reconstructed tens of times faster with a graphics processing unit than with the state-of-the-art CPUs. Here we present an auto-focusing megapixel-resolution digital holographic microscope (DHM) that uses a graphics processing unit (GPU) as the calculation engine. The computational power of the GPU allows the DHM to work in real-time such that the reconstruction distance is estimated unsupervised, and the post-processing of the holograms are made completely transparent to the user. We compare DHM with GPU and CPU and present experimental results showing a maximum of 70 focused reconstructions per second (frps) with 1024 × 1024 pixel holograms. PMID:24007070

  11. Real-time, auto-focusing digital holographic microscope using graphics processors

    NASA Astrophysics Data System (ADS)

    Doğar, Mert; İlhan, Hazar A.; Özcan, Meriç

    2013-08-01

    The most significant advantage of holographic imaging is that one does not need to do focusing alignment for the scene or objects while capturing their images. To focus on a particular object recorded in a digital hologram, a post-processing on the recorded image must be performed. This post-processing, so called the reconstruction, is essentially the calculation of wave propagation in free space. If the object's optical distance to the recording plane is not known a priori, focusing methods are used to estimate this distance. However, these operations can be quite time consuming as the hologram sizes increase. When there is a time constraint on these procedures and the image resolution is high, traditional central processing units (CPUs) can no longer satisfy the desired reconstruction speeds. Then, especially for real-time operations, additional hardware accelerators are required for reconstructing high resolution holograms. To this extend, today's commercial graphic cards offer a viable solution, as the holograms can be reconstructed tens of times faster with a graphics processing unit than with the state-of-the-art CPUs. Here we present an auto-focusing megapixel-resolution digital holographic microscope (DHM) that uses a graphics processing unit (GPU) as the calculation engine. The computational power of the GPU allows the DHM to work in real-time such that the reconstruction distance is estimated unsupervised, and the post-processing of the holograms are made completely transparent to the user. We compare DHM with GPU and CPU and present experimental results showing a maximum of 70 focused reconstructions per second (frps) with 1024 × 1024 pixel holograms.

  12. Quantum steganography with noisy quantum channels

    SciTech Connect

    Shaw, Bilal A.; Brun, Todd A.

    2011-02-15

    Steganography is the technique of hiding secret information by embedding it in a seemingly ''innocent'' message. We present protocols for hiding quantum information by disguising it as noise in a codeword of a quantum error-correcting code. The sender (Alice) swaps quantum information into the codeword and applies a random choice of unitary operation, drawing on a secret random key she shares with the receiver (Bob). Using the key, Bob can retrieve the information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We consider two types of protocols: one in which the hidden quantum information is stored locally in the codeword, and another in which it is embedded in the space of error syndromes. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for specific protocols and examples of error channels. We consider both the case where there is no actual noise in the channel (so that all errors in the codeword result from the deliberate actions of Alice), and the case where the channel is noisy and not controlled by Alice and Bob.

  13. Focusing light through scattering media by full-polarization digital optical phase conjugation

    PubMed Central

    Shen, Yuecheng; Liu, Yan; Ma, Cheng; Wang, Lihong V.

    2016-01-01

    Digital optical phase conjugation (DOPC) is an emerging technique for focusing light through or within scattering media such as biological tissue. Since DOPC systems are based on time reversal, they benefit from collecting as much information about the scattered light as possible. However, existing DOPC techniques record and subsequently phase-conjugate the scattered light in only a single polarization state, limited by the operating principle of spatial light modulators. Here, we develop the first full-polarization DOPC system which records and phase-conjugates scattered light along two orthogonal polarizations. When focusing light through thick scattering media, such as 2 mm and 4 mm thick chicken breast tissue, our full-polarization DOPC system on average doubles the focal peak-to-background ratio achieved by single-polarization DOPC systems and improves the phase conjugation fidelity. PMID:26977651

  14. Focusing light through scattering media by full-polarization digital optical phase conjugation.

    PubMed

    Shen, Yuecheng; Liu, Yan; Ma, Cheng; Wang, Lihong V

    2016-03-15

    Digital optical phase conjugation (DOPC) is an emerging technique for focusing light through or within scattering media such as biological tissue. Since DOPC systems are based on time reversal, they benefit from collecting as much information about the scattered light as possible. However, existing DOPC techniques record and subsequently phase-conjugate the scattered light in only a single-polarization state, limited by the operating principle of spatial light modulators. Here, we develop the first, to the best of our knowledge, full-polarization DOPC system that records and phase-conjugates scattered light along two orthogonal polarizations. When focusing light through thick scattering media, such as 2 mm and 4 mm-thick chicken breast tissue, our full-polarization DOPC system on average doubles the focal peak-to-background ratio achieved by single-polarization DOPC systems and improves the phase-conjugation fidelity. PMID:26977651

  15. Continuous scanning of a time-reversed ultrasonically encoded optical focus by reflection-mode digital phase conjugation

    PubMed Central

    Suzuki, Yuta; Tay, Jian Wei; Yang, Qiang; Wang, Lihong V.

    2014-01-01

    Time-reversed ultrasonically encoded (TRUE) optical focusing in turbid media was previously implemented using both analog and digital phase conjugation. The digital approach, in addition to its large energy gain, can improve the focal intensity and resolution by iterative focusing. However, performing iterative focusing at each focal position can be time-consuming. Here, we show that by gradually moving the focal position, the TRUE focal intensity is improved, as in iterative focusing at a fixed position, and can be continuously scanned to image fluorescent targets in a shorter time. Also, our setup is the first demonstration of TRUE focusing using a digital phase conjugate mirror in reflection mode, which is more suitable for practical applications. PMID:24978506

  16. Digitally focused array ultrasonic testing technique for carbon fiber composite structures

    NASA Astrophysics Data System (ADS)

    Salchak, Y.; Zhvyrblya, V.; Sednev, D.; Lider, A.

    2016-06-01

    Composite fiber reinforced polymers are highly promising structures. At present, they are widely used in different areas such as aeronautics and nuclear industries. There is a great number of advantages of composite structures such as design flexibility, low cost per cubic inch, resistance to corrosion, lower material costs, lighter weight and improved productivity. However, composites degradation may be caused by different mechanisms such as overload, impact, overheating, creep and fatigue. Comparing to inspection of other materials some unique consideration is required for testing and analysis. Ultrasound testing is the most common method for inspection of composite structures. Digitally Focused Array Technology is considered as novel approach which enables fast and effective quantitative automatic testing. In this study new methodology of quality assurance of composite structure components based on DFA is performed.

  17. A dielectrophoretic-gravity driven particle focusing technique for digital microfluidic systems

    NASA Astrophysics Data System (ADS)

    Samiei, Ehsan; Rezaei Nejad, Hojatollah; Hoorfar, Mina

    2015-05-01

    In the present study, a particle focusing technique functioning based on the cumulative effects of gravity and negative dielectrophoresis (nDEP) is developed for digital microfluidic (DMF) systems. This technique works using the conventional electrodes used for droplet manipulation without a need for geometrical modification. Particle manipulation is performed by applying an AC voltage to the electrode above which there is the droplet containing the non-buoyant particles. The particles sediment due to the difference between the gravitational and the vertical component of the nDEP forces, while the horizontal component of the nDEP force concentrates them on the center of the electrode. Therefore, the magnitude of the voltage must be kept within an effective range to have simultaneous effects of sedimentation (dominated by gravity) and concentration (due to the horizontal component of the nDEP force). The physics of the phenomenon is explained using simulation. The effects of the magnitude of the applied voltage, the particle size and density, and the electrode size on the focusing behavior of the particles are studied. Finally, a potential application of the present technique is illustrated for particle concentration in DMF.

  18. Arbitrary two-dimensional multiphoton excitation patterns with temporally focused digital holograms

    NASA Astrophysics Data System (ADS)

    Oron, Dan; Papagiakoumou, Eirini; de-Sars, Vincent; Emiliani, Valentina

    2009-02-01

    Multiphoton excitation has recently found application in the fields of bioimaging, uncaging and lithography. In order to fully exploit the advantages of nonlinear excitation, in particular the axial resolution due to nonlinearity, most systems to date operate with point or multipoint excitation, while scanning either the laser beam or the sample to generate the illumination pattern. Here we combine the recently introduced technique of scanningless multiphoton excitation by temporal focusing with recent advances in digital holography to generate arbitrarily shaped, depth resolved, two-dimensional excitation patterns completely without scanning. This is of particular importance in applications requiring uniform excitation of large areas over short time scales, such as neuronal activation by multiphoton uncaging of neurotransmitters. We present an experimental and theoretical analysis of the effect of spatial patterning on the depth resolution achieved in temporal focusing microscopy. It is shown that the depth resolution for holographic excitation is somewhat worse than that achieved for uniform illumination. This is also accompanied by the appearance of a speckle pattern at the temporal focal plane. The origin of the two effects, as well as means to overcome them, are discussed.

  19. Digital Television: Sharpening the Focus on Children. Media Now, Spring 2004

    ERIC Educational Resources Information Center

    Espejo, Eileen; Miller, Patti

    2004-01-01

    As television transitions from analog to digital, questions arise as to how to best meet the needs of children. What are the potential benefits of digital television? How can the technology be used to serve children and families, while at the same time protect them from possible harm? The transition to digital television offers a unique…

  20. An efficient steganography method for hiding patient confidential information.

    PubMed

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI). PMID:25569937

  1. Cropping and noise resilient steganography algorithm using secret image sharing

    NASA Astrophysics Data System (ADS)

    Juarez-Sandoval, Oswaldo; Fierro-Radilla, Atoany; Espejel-Trujillo, Angelina; Nakano-Miyatake, Mariko; Perez-Meana, Hector

    2015-03-01

    This paper proposes an image steganography scheme, in which a secret image is hidden into a cover image using a secret image sharing (SIS) scheme. Taking advantage of the fault tolerant property of the (k,n)-threshold SIS, where using any k of n shares (k≤n), the secret data can be recovered without any ambiguity, the proposed steganography algorithm becomes resilient to cropping and impulsive noise contamination. Among many SIS schemes proposed until now, Lin and Chan's scheme is selected as SIS, due to its lossless recovery capability of a large amount of secret data. The proposed scheme is evaluated from several points of view, such as imperceptibility of the stegoimage respect to its original cover image, robustness of hidden data to cropping operation and impulsive noise contamination. The evaluation results show a high quality of the extracted secret image from the stegoimage when it suffered more than 20% cropping or high density noise contamination.

  2. Quantum Steganography for Multi-party Covert Communication

    NASA Astrophysics Data System (ADS)

    Liu, Lin; Tang, Guang-Ming; Sun, Yi-Feng; Yan, Shu-Fan

    2016-01-01

    A novel multi-party quantum steganography protocol based on quantum secret sharing is proposed in this paper. Hidden channels are built in HBB and improved HBB quantum secret sharing protocols for secret messages transmitting, via the entanglement swapping of GHZ states and Bell measurement. Compared with the original protocol, there are only a few different GHZ sates transmitted in the proposed protocol, making the hidden channel with good imperceptibility. Moreover, the secret messages keep secure even when the hidden channel is under the attack from the dishonest participators, for the sub-secretmessages distributed randomly to different participators. With good imperceptibility and security, the capacity of proposed protocol is higher than previous multi-party quantum steganography protocol.

  3. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  4. A Practical Guide for Building a Digital Library: User-Focused Collection

    ERIC Educational Resources Information Center

    Zhu, Qin; Guevara, Sophia

    2009-01-01

    With changing user expectations, many libraries are moving toward digital content. Accessible from anywhere at any time, digital content provides users with efficient, on-demand information experiences. Accordingly, librarians are presented with challenges and opportunities to build, manage, and implement outreach strategies that promote their…

  5. Government Information Focus. The Digital Divide: Understanding and Addressing the Challenge.

    ERIC Educational Resources Information Center

    Latimer, Christopher P.

    This report discusses the challenges of the Digital Divide. Part I examines the issues concerning access as it relates to schools, communities, free Internet service providers, and broadband. Part II defines technological literacy and how it pertains to the Digital Divide debate. Part III examines those who are affected by the divide and…

  6. Passive auto-focus for digital still cameras and camera phones: Filter-switching and low-light techniques

    NASA Astrophysics Data System (ADS)

    Gamadia, Mark Noel

    In order to gain valuable market share in the growing consumer digital still camera and camera phone market, camera manufacturers have to continually add and improve existing features to their latest product offerings. Auto-focus (AF) is one such feature, whose aim is to enable consumers to quickly take sharply focused pictures with little or no manual intervention in adjusting the camera's focus lens. While AF has been a standard feature in digital still and cell-phone cameras, consumers often complain about their cameras' slow AF performance, which may lead to missed photographic opportunities, rendering valuable moments and events with undesired out-of-focus pictures. This dissertation addresses this critical issue to advance the state-of-the-art in the digital band-pass filter, passive AF method. This method is widely used to realize AF in the camera industry, where a focus actuator is adjusted via a search algorithm to locate the in-focus position by maximizing a sharpness measure extracted from a particular frequency band of the incoming image of the scene. There are no known systematic methods for automatically deriving the parameters such as the digital pass-bands or the search step-size increments used in existing passive AF schemes. Conventional methods require time consuming experimentation and tuning in order to arrive at a set of parameters which balance AF performance in terms of speed and accuracy ultimately causing a delay in product time-to-market. This dissertation presents a new framework for determining an optimal set of passive AF parameters, named Filter- Switching AF, providing an automatic approach to achieve superior AF performance, both in good and low lighting conditions based on the following performance measures (metrics): speed (total number of iterations), accuracy (offset from truth), power consumption (total distance moved), and user experience (in-focus position overrun). Performance results using three different prototype cameras

  7. High capacity image steganography method based on framelet and compressive sensing

    NASA Astrophysics Data System (ADS)

    Xiao, Moyan; He, Zhibiao

    2015-12-01

    To improve the capacity and imperceptibility of image steganography, a novel high capacity and imperceptibility image steganography method based on a combination of framelet and compressive sensing (CS) is put forward. Firstly, SVD (Singular Value Decomposition) transform to measurement values obtained by compressive sensing technique to the secret data. Then the singular values in turn embed into the low frequency coarse subbands of framelet transform to the blocks of the cover image which is divided into non-overlapping blocks. Finally, use inverse framelet transforms and combine to obtain the stego image. The experimental results show that the proposed steganography method has a good performance in hiding capacity, security and imperceptibility.

  8. Modified 8×8 quantization table and Huffman encoding steganography

    NASA Astrophysics Data System (ADS)

    Guo, Yongning; Sun, Shuliang

    2014-10-01

    A new secure steganography, which is based on Huffman encoding and modified quantized discrete cosine transform (DCT) coefficients, is provided in this paper. Firstly, the cover image is segmented into 8×8 blocks and modified DCT transformation is applied on each block. Huffman encoding is applied to code the secret image before embedding. DCT coefficients are quantized by modified quantization table. Inverse DCT(IDCT) is conducted on each block. All the blocks are combined together and the steg image is finally achieved. The experiment shows that the proposed method is better than DCT and Mahender Singh's in PSNR and Capacity.

  9. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Hesse, Danny; Hillert, Reyk

    2005-03-01

    Based on the knowledge and experiences from existing image steganalysis techniques, the overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios. One aspect is to understand operational requirements of recent steganographic techniques for VoIP applications. The other aspect is to elaborate possible steganalysis approaches applied to speech data. In particular we have examined existing VoIP applications with respect to their extensibility to steganographic algorithms. We have also paid attention to the part of steganalysis in PCM audio data which allows us to detect hidden communication while a running VoIP communication with the usage of the PCM codec. In our impelementation we use Jori's Voice over IP library by Jori Liesenborgs (JVOIPLIB) that provides primitives for a voice over IP communication. Finally we show first results of our prototypic implementation which extents the common VoIP scenario by the new feature of steganography. We also show the results for our PCM steganalyzer framework that is able to detect this kind of hidden communication by using a set of 13 first and second order statistics.

  10. Nested image steganography scheme using QR-barcode technique

    NASA Astrophysics Data System (ADS)

    Chen, Wen-Yuan; Wang, Jing-Wein

    2009-05-01

    In this paper, QR bar code and image processing techniques are used to construct a nested steganography scheme. There are two types of secret data (lossless and lossy) embedded into a cover image. The lossless data is text that is first encoded by the QR barcode; its data does not have any distortion when comparing with the extracted data and original data. The lossy data is a kind of image; the face image is suitable for our case. Because the extracted text is lossless, the error correction rate of QR encoding must be carefully designed. We found a 25% error correction rate is suitable for our goal. In image embedding, because it can sustain minor perceptible distortion, we thus adopted the lower nibble byte discard of the face image to reduce the secret data. When the image is extracted, we use a median filter to filter out the noise and obtain a smoother image quality. After simulation, it is evident that our scheme is robust to JPEG attacks. Compared to other steganography schemes, our proposed method has three advantages: (i) the nested scheme is an enhanced security system never previously developed; (ii) our scheme can conceal lossless and lossy secret data into a cover image simultaneously; and (iii) the QR barcode used as secret data can widely extend this method's application fields.

  11. Laser Modified ZnO/CdSSe Core-Shell Nanowire Arrays for Micro-Steganography and Improved Photoconduction

    NASA Astrophysics Data System (ADS)

    Lu, Junpeng; Liu, Hongwei; Zheng, Minrui; Zhang, Hongji; Lim, Sharon Xiaodai; Tok, Eng Soon; Sow, Chorng Haur

    2014-09-01

    Arrays of ZnO/CdSSe core/shell nanowires with shells of tunable band gaps represent a class of interesting hybrid nanomaterials with unique optical and photoelectrical properties due to their type II heterojunctions and chemical compositions. In this work, we demonstrate that direct focused laser beam irradiation is able to achieve localized modification of the hybrid structure and chemical composition of the nanowire arrays. As a result, the photoresponsivity of the laser modified hybrid is improved by a factor of ~3. A 3D photodetector with improved performance is demonstrated using laser modified nanowire arrays overlaid with monolayer graphene as the top electrode. Finally, by controlling the power of the scanning focused laser beam, micropatterns with different fluorescence emissions are created on a substrate covered with nanowire arrays. Such a pattern is not apparent when imaged under normal optical microscopy but the pattern becomes readily revealed under fluorescence microscopy i.e. a form of Micro-Steganography is achieved.

  12. Digital multi-focusing from a single photograph taken with an uncalibrated conventional camera.

    PubMed

    Cao, Yang; Fang, Shuai; Wang, Zengfu

    2013-09-01

    The demand to restore all-in-focus images from defocused images and produce photographs focused at different depths is emerging in more and more cases, such as low-end hand-held cameras and surveillance cameras. In this paper, we manage to solve this challenging multi-focusing problem with a single image taken with an uncalibrated conventional camera. Different from all existing multi-focusing approaches, our method does not need to include a deconvolution process, which is quite time-consuming and will cause ringing artifacts in the focused region and low depth-of-field. This paper proposes a novel systematic approach to realize multi-focusing from a single photograph. First of all, with the optical explanation for the local smooth assumption, we present a new point-to-point defocus model. Next, the blur map of the input image, which reflects the amount of defocus blur at each pixel in the image, is estimated by two steps. 1) With the sharp edge prior, a rough blur map is obtained by estimating the blur amount at the edge regions. 2) The guided image filter is applied to propagate the blur value from the edge regions to the whole image by which a refined blur map is obtained. Thus far, we can restore the all-in-focus photograph from a defocused input. To further produce photographs focused at different depths, the depth map from the blur map must be derived. To eliminate the ambiguity over the focal plane, user interaction is introduced and a binary graph cut algorithm is used. So we introduce user interaction and use a binary graph cut algorithm to eliminate the ambiguity over the focal plane. Coupled with the camera parameters, this approach produces images focused at different depths. The performance of this new multi-focusing algorithm is evaluated both objectively and subjectively by various test images. Both results demonstrate that this algorithm produces high quality depth maps and multi-focusing results, outperforming the previous approaches. PMID

  13. Introduction to Focus Issue: Intrinsic and Designed Computation: Information Processing in Dynamical Systems-Beyond the Digital Hegemony

    NASA Astrophysics Data System (ADS)

    Crutchfield, James P.; Ditto, William L.; Sinha, Sudeshna

    2010-09-01

    How dynamical systems store and process information is a fundamental question that touches a remarkably wide set of contemporary issues: from the breakdown of Moore's scaling laws—that predicted the inexorable improvement in digital circuitry—to basic philosophical problems of pattern in the natural world. It is a question that also returns one to the earliest days of the foundations of dynamical systems theory, probability theory, mathematical logic, communication theory, and theoretical computer science. We introduce the broad and rather eclectic set of articles in this Focus Issue that highlights a range of current challenges in computing and dynamical systems.

  14. Introduction to focus issue: intrinsic and designed computation: information processing in dynamical systems--beyond the digital hegemony.

    PubMed

    Crutchfield, James P; Ditto, William L; Sinha, Sudeshna

    2010-09-01

    How dynamical systems store and process information is a fundamental question that touches a remarkably wide set of contemporary issues: from the breakdown of Moore's scaling laws--that predicted the inexorable improvement in digital circuitry--to basic philosophical problems of pattern in the natural world. It is a question that also returns one to the earliest days of the foundations of dynamical systems theory, probability theory, mathematical logic, communication theory, and theoretical computer science. We introduce the broad and rather eclectic set of articles in this Focus Issue that highlights a range of current challenges in computing and dynamical systems. PMID:20887067

  15. Focus on the Journey, Not the Destination: Digital Games and Students with Disability

    ERIC Educational Resources Information Center

    Main, Susan; O'Rourke, John; Morris, Julia; Dunjey, Helen

    2016-01-01

    The way in which technologies support students with disability has been widely explored in recent times. Much of this research has focused on computer programs specifically designed to teach social and academic skills to students with disability. In the research reported in this paper we examined how students with disability could use technology…

  16. Improving the privacy of optical steganography with temporal phase masks.

    PubMed

    Wang, Z; Fok, M P; Xu, L; Chang, J; Prucnal, P R

    2010-03-15

    Temporal phase modulation of spread stealth signals is proposed and demonstrated to improve optical steganography transmission privacy. After phase modulation, the temporally spread stealth signal has a more complex spectral-phase-temporal relationship, such that the original temporal profile cannot be restored when only dispersion compensation is applied to the temporally spread stealth signals. Therefore, it increases the difficulty for the eavesdropper to detect and intercept the stealth channel that is hidden under a public transmission, even with a correct dispersion compensation device. The experimental results demonstrate the feasibility of this approach and display insignificant degradation in transmission performance, compared to the conventional stealth transmission without temporal phase modulation. The proposed system can also work without a clock transmission for signal synchronization. Our analysis and simulation results show that it is difficult for the adversary to detect the existence of the stealth transmission, or find the correct phase mask to recover the stealth signals. PMID:20389629

  17. Optical steganography based on amplified spontaneous emission noise.

    PubMed

    Wu, Ben; Wang, Zhenxing; Tian, Yue; Fok, Mable P; Shastri, Bhavin J; Kanoff, Daniel R; Prucnal, Paul R

    2013-01-28

    We propose and experimentally demonstrate an optical steganography method in which a data signal is transmitted using amplified spontaneous emission (ASE) noise as a carrier. The ASE serving as a carrier for the private signal has an identical frequency spectrum to the existing noise generated by the Erbium doped fiber amplifiers (EDFAs) in the transmission system. The system also carries a conventional data channel that is not private. The so-called "stealth" or private channel is well-hidden within the noise of the system. Phase modulation is used for both the stealth channel and the public channel. Using homodyne detection, the short coherence length of the ASE ensures that the stealth signal can only be recovered if the receiver closely matches the delay-length difference, which is deliberately changed in a dynamic fashion that is only known to the transmitter and its intended receiver. PMID:23389187

  18. Digital FDIRC: A focused differential internal reflection Cherenkov imaged by SiPM arrays

    NASA Astrophysics Data System (ADS)

    Marrocchesi, P. S.; Bagliesi, M. G.; Basti, A.; Bigongiari, G.; Bonechi, S.; Brogi, P.; Checchia, C.; Collazuol, G.; Maestro, P.; Morsani, F.; Piemonte, C.; Stolzi, F.; Suh, J. E.; Sulaj, A.

    2016-07-01

    A prototype of an Internal Reflection Cherenkov, equipped with a SiO2 (fused silica) radiator bar optically connected to a cylindrical mirror, was tested at CERN SPS in March 2015 with a beam of relativistic ions obtained from fragmentation of primary argon nuclei at energies 13, 19 and 30 GeV/n. The detector, designed to identify cosmic nuclei, features an imaging focal plane of dimensions ~ 4 cm × 3 cm equipped with 16 arrays of NUV-SiPM (near-ultraviolet sensitive silicon photon avalanche detector) for a total of 1024 sensitive elements. The outstanding performance of the photodetectors (with negligible background in between adjacent photopeaks) allowed us to apply the technique of photon counting to the Cherenkov light collected on the focal plane. Thanks to the fine granularity of the array elements, the Cherenkov pattern was recorded together with the total number of detected photoelectrons increasing as Z2 as a function of the atomic number Z. In this paper, we report the performance of the SiPM arrays and the excellent resolution achieved by the digital Cherenkov prototype in the charge identification of the elements present in the beam.

  19. Enhanced quantitative phase imaging in self-interference digital holographic microscopy using an electrically focus tunable lens

    PubMed Central

    Schubert, Robin; Vollmer, Angelika; Ketelhut, Steffi; Kemper, Björn

    2014-01-01

    Self-interference digital holographic microscopy (DHM) has been found particular suitable for simplified quantitative phase imaging of living cells. However, a main drawback of the self-interference DHM principle are scattering patterns that are induced by the coherent nature of the laser light which affect the resolution for detection of optical path length changes. We present a simple and efficient technique for the reduction of coherent disturbances in quantitative phase images. Therefore, amplitude and phase of the sample illumination are modulated by an electrically focus tunable lens. The proposed method is in particular convenient with the self-interference DHM concept. Results from the characterization of the method show that a reduction of coherence induced disturbances up to 70 percent can be achieved. Finally, the performance for enhanced quantitative imaging of living cells is demonstrated. PMID:25574433

  20. Fast volumetric imaging with patterned illumination via digital micro-mirror device-based temporal focusing multiphoton microscopy.

    PubMed

    Chang, Chia-Yuan; Hu, Yvonne Yuling; Lin, Chun-Yu; Lin, Cheng-Han; Chang, Hsin-Yu; Tsai, Sheng-Feng; Lin, Tzu-Wei; Chen, Shean-Jen

    2016-05-01

    Temporal focusing multiphoton microscopy (TFMPM) has the advantage of area excitation in an axial confinement of only a few microns; hence, it can offer fast three-dimensional (3D) multiphoton imaging. Herein, fast volumetric imaging via a developed digital micromirror device (DMD)-based TFMPM has been realized through the synchronization of an electron multiplying charge-coupled device (EMCCD) with a dynamic piezoelectric stage for axial scanning. The volumetric imaging rate can achieve 30 volumes per second according to the EMCCD frame rate of more than 400 frames per second, which allows for the 3D Brownian motion of one-micron fluorescent beads to be spatially observed. Furthermore, it is demonstrated that the dynamic HiLo structural multiphoton microscope can reject background noise by way of the fast volumetric imaging with high-speed DMD patterned illumination. PMID:27231617

  1. Fast volumetric imaging with patterned illumination via digital micro-mirror device-based temporal focusing multiphoton microscopy

    PubMed Central

    Chang, Chia-Yuan; Hu, Yvonne Yuling; Lin, Chun-Yu; Lin, Cheng-Han; Chang, Hsin-Yu; Tsai, Sheng-Feng; Lin, Tzu-Wei; Chen, Shean-Jen

    2016-01-01

    Temporal focusing multiphoton microscopy (TFMPM) has the advantage of area excitation in an axial confinement of only a few microns; hence, it can offer fast three-dimensional (3D) multiphoton imaging. Herein, fast volumetric imaging via a developed digital micromirror device (DMD)-based TFMPM has been realized through the synchronization of an electron multiplying charge-coupled device (EMCCD) with a dynamic piezoelectric stage for axial scanning. The volumetric imaging rate can achieve 30 volumes per second according to the EMCCD frame rate of more than 400 frames per second, which allows for the 3D Brownian motion of one-micron fluorescent beads to be spatially observed. Furthermore, it is demonstrated that the dynamic HiLo structural multiphoton microscope can reject background noise by way of the fast volumetric imaging with high-speed DMD patterned illumination. PMID:27231617

  2. Demonstration of optical steganography transmission using temporal phase coded optical signals with spectral notch filtering.

    PubMed

    Hong, Xuezhi; Wang, Dawei; Xu, Lei; He, Sailing

    2010-06-01

    A novel approach is proposed and experimentally demonstrated for optical steganography transmission in WDM networks using temporal phase coded optical signals with spectral notch filtering. A temporal phase coded stealth channel is temporally and spectrally overlaid onto a public WDM channel. Direct detection of the public channel is achieved in the presence of the stealth channel. The interference from the public channel is suppressed by spectral notching before the detection of the optical stealth signal. The approach is shown to have good compatibility and robustness to the existing WDM network for optical steganography transmission. PMID:20588368

  3. A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography

    NASA Astrophysics Data System (ADS)

    Islam, Muhammad F.; Islam, Mohammed N.

    2012-04-01

    The objective of this paper is to develop a novel approach for encryption and compression of biometric information utilizing orthogonal coding and steganography techniques. Multiple biometric signatures are encrypted individually using orthogonal codes and then multiplexed together to form a single image, which is then embedded in a cover image using the proposed steganography technique. The proposed technique employs three least significant bits for this purpose and a secret key is developed to choose one from among these bits to be replaced by the corresponding bit of the biometric image. The proposed technique offers secure transmission of multiple biometric signatures in an identification document which will be protected from unauthorized steganalysis attempt.

  4. Steganography forensics method for detecting least significant bit replacement attack

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  5. High-efficiency quantum steganography based on the tensor product of Bell states

    NASA Astrophysics Data System (ADS)

    Xu, ShuJiang; Chen, XiuBo; Niu, XinXin; Yang, YiXian

    2013-09-01

    In this paper, we first propose a hidden rule among the secure message, the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states, and then present a high-efficiency quantum steganography protocol under the control of the hidden rule. In the proposed quantum steganography scheme, a hidden channel is established to transfer a secret message within any quantum secure direct communication (QSDC) scheme that is based on 2-level quantum states and unitary transformations. The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations. To accurately describe the capacity of a steganography scheme, a quantitative measure, named embedding efficiency, is introduced in this paper. The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility. Moreover, it is shown that this scheme can resist all serious attacks including the intercept-resend attack, measurement-resend attack, auxiliary particle attack and even the Denial of Service attack. To improve the efficiency of the proposed scheme, the hidden rule is extended based on the tensor product of multiple Bell states.

  6. Use and Users of Digital Resources: A Focus on Undergraduate Education in the Humanities and Social Sciences

    ERIC Educational Resources Information Center

    Harley, Diane; Henke, Johnathan; Lawrence, Shannon; Miller, Ian; Perciali, Irene; Nasatir, David

    2006-01-01

    The purpose of our research was (1) to map the universe of digital resources available to a subset of undergraduate educators in the humanities and social sciences, and (2) to investigate how and if available digital resources are actually being used in undergraduate teaching environments. We employed multiple methods, including surveys and focus…

  7. A Situated Practice of Ethics for Participatory Visual and Digital Methods in Public Health Research and Practice: A Focus on Digital Storytelling

    PubMed Central

    Hill, Amy L.; Flicker, Sarah

    2014-01-01

    This article explores ethical considerations related to participatory visual and digital methods for public health research and practice, through the lens of an approach known as “digital storytelling.” We begin by briefly describing the digital storytelling process and its applications to public health research and practice. Next, we explore 6 common challenges: fuzzy boundaries, recruitment and consent to participate, power of shaping, representation and harm, confidentiality, and release of materials. We discuss their complexities and offer some considerations for ethical practice. We hope this article serves as a catalyst for expanded dialogue about the need for high standards of integrity and a situated practice of ethics wherein researchers and practitioners reflexively consider ethical decision-making as part of the ongoing work of public health. PMID:23948015

  8. Laser modified ZnO/CdSSe core-shell nanowire arrays for Micro-Steganography and improved photoconduction.

    PubMed

    Lu, Junpeng; Liu, Hongwei; Zheng, Minrui; Zhang, Hongji; Lim, Sharon Xiaodai; Tok, Eng Soon; Sow, Chorng Haur

    2014-01-01

    Arrays of ZnO/CdSSe core/shell nanowires with shells of tunable band gaps represent a class of interesting hybrid nanomaterials with unique optical and photoelectrical properties due to their type II heterojunctions and chemical compositions. In this work, we demonstrate that direct focused laser beam irradiation is able to achieve localized modification of the hybrid structure and chemical composition of the nanowire arrays. As a result, the photoresponsivity of the laser modified hybrid is improved by a factor of ~3. A 3D photodetector with improved performance is demonstrated using laser modified nanowire arrays overlaid with monolayer graphene as the top electrode. Finally, by controlling the power of the scanning focused laser beam, micropatterns with different fluorescence emissions are created on a substrate covered with nanowire arrays. Such a pattern is not apparent when imaged under normal optical microscopy but the pattern becomes readily revealed under fluorescence microscopy i.e. a form of Micro-Steganography is achieved. PMID:25213321

  9. Laser Modified ZnO/CdSSe Core-Shell Nanowire Arrays for Micro-Steganography and Improved Photoconduction

    PubMed Central

    Lu, Junpeng; Liu, Hongwei; Zheng, Minrui; Zhang, Hongji; Lim, Sharon Xiaodai; Tok, Eng Soon; Sow, Chorng Haur

    2014-01-01

    Arrays of ZnO/CdSSe core/shell nanowires with shells of tunable band gaps represent a class of interesting hybrid nanomaterials with unique optical and photoelectrical properties due to their type II heterojunctions and chemical compositions. In this work, we demonstrate that direct focused laser beam irradiation is able to achieve localized modification of the hybrid structure and chemical composition of the nanowire arrays. As a result, the photoresponsivity of the laser modified hybrid is improved by a factor of ~3. A 3D photodetector with improved performance is demonstrated using laser modified nanowire arrays overlaid with monolayer graphene as the top electrode. Finally, by controlling the power of the scanning focused laser beam, micropatterns with different fluorescence emissions are created on a substrate covered with nanowire arrays. Such a pattern is not apparent when imaged under normal optical microscopy but the pattern becomes readily revealed under fluorescence microscopy i.e. a form of Micro-Steganography is achieved. PMID:25213321

  10. Quantum steganography with large payload based on entanglement swapping of χ-type entangled states

    NASA Astrophysics Data System (ADS)

    Qu, Zhi-Guo; Chen, Xiu-Bo; Luo, Ming-Xing; Niu, Xin-Xin; Yang, Yi-Xian

    2011-04-01

    In this paper, we firstly propose a new simple method to calculate entanglement swapping of χ-type entangled states, and then present a novel quantum steganography protocol with large payload. The new protocol adopts entanglement swapping to build up the hidden channel within quantum secure direct communication with χ-type entangled states for securely transmitting secret messages. Comparing with the previous quantum steganographies, the capacity of the hidden channel is much higher, which is increased to eight bits. Meanwhile, due to the quantum uncertainty theorem and the no-cloning theorem its imperceptibility is proved to be great in the analysis, and its security is also analyzed in detail, which is proved that intercept-resend attack, measurement-resend attack, ancilla attack, man-in-the-middle attack or even Dos(Denial of Service) attack couldn't threaten it. As a result, the protocol can be applied in various fields of quantum communication.

  11. DTCWT based high capacity steganography using coefficient replacement and adaptive scaling

    NASA Astrophysics Data System (ADS)

    Sathisha, N.; Priya, R.; Babu, K. Suresh; Raja, K. B.; Venugopal, K. R.; Patnaik, L. M.

    2013-12-01

    The steganography is used for secure communication. In this paper we propose Dual Tree Complex Wavelet Transform (DTCWT) based high capacity steganography using coefficient replacement and adaptive scaling. The DTCWT is applied on cover image and Lifting Wavelet Transform2 (LWT2) is applied on payload to convert spatial domain into transform domain. The new concept of replacing HH sub band coefficients of DTCWT of cover image by LL sub band coefficients of payload is introduced to generate intermediate stego object. The adaptive scaling factor is used based on entropy of cover image to scale down intermediate stego object coefficient values to generate final stego object. It is observed that the capacity and security are increased in the proposed algorithm compared to existing algorithms.

  12. Digital video steganalysis using motion vector recovery-based features.

    PubMed

    Deng, Yu; Wu, Yunjie; Zhou, Linna

    2012-07-10

    As a novel digital video steganography, the motion vector (MV)-based steganographic algorithm leverages the MVs as the information carriers to hide the secret messages. The existing steganalyzers based on the statistical characteristics of the spatial/frequency coefficients of the video frames cannot attack the MV-based steganography. In order to detect the presence of information hidden in the MVs of video streams, we design a novel MV recovery algorithm and propose the calibration distance histogram-based statistical features for steganalysis. The support vector machine (SVM) is trained with the proposed features and used as the steganalyzer. Experimental results demonstrate that the proposed steganalyzer can effectively detect the presence of hidden messages and outperform others by the significant improvements in detection accuracy even with low embedding rates. PMID:22781241

  13. Practical steganalysis of digital images: state of the art

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica; Goljan, Miroslav

    2002-04-01

    Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a great deal of attention both from law enforcement and the media. In our paper, we classify and review current stego-detection algorithms that can be used to trace popular steganographic products. We recognize several qualitatively different approaches to practical steganalysis - visual detection, detection based on first order statistics (histogram analysis), dual statistics methods that use spatial correlations in images and higher-order statistics (RS steganalysis), universal blind detection schemes, and special cases, such as JPEG compatibility steganalysis. We also present some new results regarding our previously proposed detection of LSB embedding using sensitive dual statistics. The recent steganalytic methods indicate that the most common paradigm in image steganography - the bit-replacement or bit substitution - is inherently insecure with safe capacities far smaller than previously thought.

  14. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data. PMID:24109934

  15. Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java

    ERIC Educational Resources Information Center

    Courtney, Mary F.; Stix, Allen

    2006-01-01

    Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…

  16. Detecting 2LSB steganography using extended pairs of values analysis

    NASA Astrophysics Data System (ADS)

    Khalind, Omed; Aziz, Benjamin

    2014-05-01

    In this paper, we propose an extended pairs of values analysis to detect and estimate the amount of secret messages embedded with 2LSB replacement in digital images based on chi-square attack and regularity rate in pixel values. The detection process is separated from the estimation of the hidden message length, as it is the main requirement of any steganalysis method. Hence, the detection process acts as a discrete classifier, which classifies a given set of images into stego and clean classes. The method can accurately detect 2LSB replacement even when the message length is about 10% of the total capacity, it also reaches its best performance with an accuracy of higher than 0.96 and a true positive rate of more than 0.997 when the amount of data are 20% to 100% of the total capacity. However, the method puts no assumptions neither on the image nor the secret message, as it tested with two sets of 3000 images, compressed and uncompressed, embedded with a random message for each case. This method of detection could also be used as an automated tool to analyse a bulk of images for hidden contents, which could be used by digital forensics analysts in their investigation process.

  17. On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography

    NASA Astrophysics Data System (ADS)

    Wahab, Ainuddin Wahid Abdul; Briffa, Johann A.; Schaathun, Hans Georg

    In this paper, we study the wavelet decomposition based steganalysis technique due to Lyu and Farid. Specifically we focus on its performance with JSteg steganograpy. It has been claimed that the Lyu-Farid technique can defeat JSteg; we confirm this using different images for the training and test sets of the SVM classifier. We also show that the technique heavily depends on the characteristics of training and test set. This is a problem for real-world implementation since the image source cannot necessarily be determined. With a wide range of image sources, training the classifier becomes problematic. By focusing only on different camera makes we show that steganalysis performances significantly less effective for cover images from certain sources.

  18. Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise.

    PubMed

    Wu, Ben; Wang, Zhenxing; Shastri, Bhavin J; Chang, Matthew P; Frost, Nicholas A; Prucnal, Paul R

    2014-01-13

    A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the security of the stealth channel in an optical steganography system. The stealth channel is protected in two levels. In the first level, the data is carried by amplified spontaneous emission (ASE) noise, which cannot be detected in either the time domain or spectral domain. In the second level, even if the eavesdropper suspects the existence of the stealth channel, each data bit is covered by a fast changing phase mask. The phase mask code is always combined with the wide band noise from ASE. Without knowing the right phase mask code to recover the stealth data, the eavesdropper can only receive the noise like signal with randomized phase. PMID:24515055

  19. Blind steganalysis method for JPEG steganography combined with the semisupervised learning and soft margin support vector machine

    NASA Astrophysics Data System (ADS)

    Dong, Yu; Zhang, Tao; Xi, Ling

    2015-01-01

    Stego images embedded by unknown steganographic algorithms currently may not be detected by using steganalysis detectors based on binary classifier. However, it is difficult to obtain high detection accuracy by using universal steganalysis based on one-class classifier. For solving this problem, a blind detection method for JPEG steganography was proposed from the perspective of information theory. The proposed method combined the semisupervised learning and soft margin support vector machine with steganalysis detector based on one-class classifier to utilize the information in test data for improving detection performance. Reliable blind detection for JPEG steganography was realized only using cover images for training. The experimental results show that the proposed method can contribute to improving the detection accuracy of steganalysis detector based on one-class classifier and has good robustness under different source mismatch conditions.

  20. On the extensive unification of digital-to-analog converters and kernels

    NASA Astrophysics Data System (ADS)

    Liao, Yanchu

    2012-09-01

    System administrators agree that scalable communication is an interesting new topic in the field of steganography, and leading analysts concur. After years of unfortunate re-search into context-free grammar, we argue the intuitive unification of fiber-optic cables and context-free grammar. Our focus here is not on whether sensor networks and randomized algorithms can collaborate to accomplish this aim, but rather on introducing an analysis of DHTs [2] (Soupy Coil).

  1. A Comparison of Web-Based Library Catalogs and Museum Exhibits and Their Impacts on Actual Visits: A Focus Group Evaluation for the Colorado Digitization Project.

    ERIC Educational Resources Information Center

    Fry, Thomas K.; Lance, Keith Curry; Cox, Marti A.; Moe, Tammi

    The Colorado Digitization Project (CDP) commissioned the Library Research Service (LRS) of the Colorado State Library and the University of Denver Library and Information Science Program to evaluate user perceptions of the relative merits of the catalog (or database) and the exhibit approaches to providing access to digital information, especially…

  2. H. Sapiens Digital: From Digital Immigrants and Digital Natives to Digital Wisdom

    ERIC Educational Resources Information Center

    Prensky, Marc

    2009-01-01

    As we move further into the 21st century, the digital native/digital immigrant paradigm created by Marc Prensky in 2001 is becoming less relevant. In this article, Prensky suggests that we should focus instead on the development of what he calls "digital wisdom." Arguing that digital technology can make us not just smarter but truly wiser, Prensky…

  3. A high-capacity steganography scheme for JPEG2000 baseline system.

    PubMed

    Zhang, Liang; Wang, Haili; Wu, Renbiao

    2009-08-01

    Hiding capacity is very important for efficient covert communications. For JPEG2000 compressed images, it is necessary to enlarge the hiding capacity because the available redundancy is very limited. In addition, the bitstream truncation makes it difficult to hide information. In this paper, a high-capacity steganography scheme is proposed for the JPEG2000 baseline system, which uses bit-plane encoding procedure twice to solve the problem due to bitstream truncation. Moreover, embedding points and their intensity are determined in a well defined quantitative manner via redundancy evaluation to increase hiding capacity. The redundancy is measured by bit, which is different from conventional methods which adjust the embedding intensity by multiplying a visual masking factor. High volumetric data is embedded into bit-planes as low as possible to keep message integrality, but at the cost of an extra bit-plane encoding procedure and slightly changed compression ratio. The proposed method can be easily integrated into the JPEG2000 image coder, and the produced stego-bitstream can be decoded normally. Simulation shows that the proposed method is feasible, effective, and secure. PMID:19398405

  4. Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.

    PubMed

    Ibaida, Ayman; Khalil, Ibrahim

    2013-12-01

    With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as point-of-care (PoC) applications in hospitals around the world. Therefore, huge amount of ECG signal collected by body sensor networks from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level, etc., and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data are being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this paper, a wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the percentage residual difference and the wavelet weighted PRD. It is found that the proposed technique provides high-security protection for patients data with low (less than 1%) distortion and ECG data remain diagnosable after watermarking (i.e., hiding patient confidential data) and as well as after watermarks (i.e., hidden data) are removed from the watermarked data. PMID:23708767

  5. A graph theory practice on transformed image: a random image steganography.

    PubMed

    Thanikaiselvan, V; Arulmozhivarman, P; Subashanthini, S; Amirtharajan, Rengarajan

    2013-01-01

    Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients. PMID:24453857

  6. A Graph Theory Practice on Transformed Image: A Random Image Steganography

    PubMed Central

    Thanikaiselvan, V.; Arulmozhivarman, P.; Subashanthini, S.; Amirtharajan, Rengarajan

    2013-01-01

    Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients. PMID:24453857

  7. Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission.

    PubMed

    Edward Jero, S; Ramu, Palaniappan; Ramakrishnan, S

    2014-10-01

    ECG Steganography provides secured transmission of secret information such as patient personal information through ECG signals. This paper proposes an approach that uses discrete wavelet transform to decompose signals and singular value decomposition (SVD) to embed the secret information into the decomposed ECG signal. The novelty of the proposed method is to embed the watermark using SVD into the two dimensional (2D) ECG image. The embedding of secret information in a selected sub band of the decomposed ECG is achieved by replacing the singular values of the decomposed cover image by the singular values of the secret data. The performance assessment of the proposed approach allows understanding the suitable sub-band to hide secret data and the signal degradation that will affect diagnosability. Performance is measured using metrics like Kullback-Leibler divergence (KL), percentage residual difference (PRD), peak signal to noise ratio (PSNR) and bit error rate (BER). A dynamic location selection approach for embedding the singular values is also discussed. The proposed approach is demonstrated on a MIT-BIH database and the observations validate that HH is the ideal sub-band to hide data. It is also observed that the signal degradation (less than 0.6%) is very less in the proposed approach even with the secret data being as large as the sub band size. So, it does not affect the diagnosability and is reliable to transmit patient information. PMID:25187409

  8. A novel fuzzy logic-based image steganography method to ensure medical data security.

    PubMed

    Karakış, R; Güler, I; Çapraz, I; Bilir, E

    2015-12-01

    This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals. PMID:26555746

  9. Pedagogical Praxis Surrounding the Integration of Photography, Visual Literacy, Digital Literacy, and Educational Technology into Business Education Classrooms: A Focus Group Study

    ERIC Educational Resources Information Center

    Schlosser, Peter Allen

    2010-01-01

    This paper reports on an investigation into how Marketing and Business Education Teachers utilize and integrate educational technology into curriculum through the use of photography. The ontology of this visual, technological, and language interface is explored with an eye toward visual literacy, digital literacy, and pedagogical praxis, focusing…

  10. Effect of using different cover image quality to obtain robust selective embedding in steganography

    NASA Astrophysics Data System (ADS)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  11. Electrostatically focused addressable field emission array chips (AFEA's) for high-speed massively parallel maskless digital E-beam direct write lithography and scanning electron microscopy

    DOEpatents

    Thomas, Clarence E.; Baylor, Larry R.; Voelkl, Edgar; Simpson, Michael L.; Paulus, Michael J.; Lowndes, Douglas H.; Whealton, John H.; Whitson, John C.; Wilgen, John B.

    2002-12-24

    Systems and methods are described for addressable field emission array (AFEA) chips. A method of operating an addressable field-emission array, includes: generating a plurality of electron beams from a pluralitly of emitters that compose the addressable field-emission array; and focusing at least one of the plurality of electron beams with an on-chip electrostatic focusing stack. The systems and methods provide advantages including the avoidance of space-charge blow-up.

  12. Focus stacking: Comparing commercial top-end set-ups with a semi-automatic low budget approach. A possible solution for mass digitization of type specimens.

    PubMed

    Brecko, Jonathan; Mathys, Aurore; Dekoninck, Wouter; Leponce, Maurice; VandenSpiegel, Didier; Semal, Patrick

    2014-01-01

    In this manuscript we present a focus stacking system, composed of commercial photographic equipment. The system is inexpensive compared to high-end commercial focus stacking solutions. We tested this system and compared the results with several different software packages (CombineZP, Auto-Montage, Helicon Focus and Zerene Stacker). We tested our final stacked picture with a picture obtained from two high-end focus stacking solutions: a Leica MZ16A with DFC500 and a Leica Z6APO with DFC290. Zerene Stacker and Helicon Focus both provided satisfactory results. However, Zerene Stacker gives the user more possibilities in terms of control of the software, batch processing and retouching. The outcome of the test on high-end solutions demonstrates that our approach performs better in several ways. The resolution of the tested extended focus pictures is much higher than those from the Leica systems. The flash lighting inside the Ikea closet creates an evenly illuminated picture, without struggling with filters, diffusers, etc. The largest benefit is the price of the set-up which is approximately € 3,000, which is 8 and 10 times less than the LeicaZ6APO and LeicaMZ16A set-up respectively. Overall, this enables institutions to purchase multiple solutions or to start digitising the type collection on a large scale even with a small budget. PMID:25589866

  13. Focus stacking: Comparing commercial top-end set-ups with a semi-automatic low budget approach. A possible solution for mass digitization of type specimens

    PubMed Central

    Brecko, Jonathan; Mathys, Aurore; Dekoninck, Wouter; Leponce, Maurice; VandenSpiegel, Didier; Semal, Patrick

    2014-01-01

    Abstract In this manuscript we present a focus stacking system, composed of commercial photographic equipment. The system is inexpensive compared to high-end commercial focus stacking solutions. We tested this system and compared the results with several different software packages (CombineZP, Auto-Montage, Helicon Focus and Zerene Stacker). We tested our final stacked picture with a picture obtained from two high-end focus stacking solutions: a Leica MZ16A with DFC500 and a Leica Z6APO with DFC290. Zerene Stacker and Helicon Focus both provided satisfactory results. However, Zerene Stacker gives the user more possibilities in terms of control of the software, batch processing and retouching. The outcome of the test on high-end solutions demonstrates that our approach performs better in several ways. The resolution of the tested extended focus pictures is much higher than those from the Leica systems. The flash lighting inside the Ikea closet creates an evenly illuminated picture, without struggling with filters, diffusers, etc. The largest benefit is the price of the set-up which is approximately € 3,000, which is 8 and 10 times less than the LeicaZ6APO and LeicaMZ16A set-up respectively. Overall, this enables institutions to purchase multiple solutions or to start digitising the type collection on a large scale even with a small budget. PMID:25589866

  14. Audre's daughter: Black lesbian steganography in Dee Rees' Pariah and Audre Lorde's Zami: A New Spelling of My Name.

    PubMed

    Kang, Nancy

    2016-01-01

    This article argues that African-American director Dee Rees' critically acclaimed debut Pariah (2011) is a rewriting of lesbian poet-activist Audre Lorde's iconic "bio-mythography" Zami: A New Spelling of My Name (1982). The article examines how Rees' work creatively and subtly re-envisions Lorde's Zami by way of deeply rooted and often cleverly camouflaged patterns, resonances, and contrasts. Shared topics include naming, mother-daughter bonds, the role of clothing in identity formation, domestic abuse, queer time, and lesbian, gay, bisexual, and transgender legacy discourse construction. What emerges between the visual and written texts is a hidden language of connection--what may be termed Black lesbian steganography--which proves thought-provoking to viewers and readers alike. PMID:26914826

  15. Will Digital Texts Succeed?

    ERIC Educational Resources Information Center

    Acker, Stephen R.

    2008-01-01

    With faculty changing instructional practices to take advantage of customizable, focused content (and digital delivery of that content), many people assume that digital distribution is the answer to bringing the costs of course content delivery in line. But the picture just isn't that simple. A wide continuum of options is available to faculty and…

  16. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders. PMID:17907609

  17. Digitization Best Practices

    SciTech Connect

    Xue, Fei; Holtkamp, Irma S.; Knudson, Frances L.

    2012-07-31

    This project involved performing tests and documenting results to determine best practices for digitizing older print documents. The digitization process is complicated, especially when original documents exhibit non-standard fonts and are faded. Tests focused on solutions to improve high quality scanning, increase OCR accuracy, and efficiently use embedded metadata. Results are summarized. From the test results on the right sides, we know that when we plan to digitize documents, we should balance Quantity and Quality based on our expectation, and then make final decision for the digitization process.

  18. Digital psychiatry.

    PubMed

    Tang, S; Helmeste, D

    2000-02-01

    The American managed care movement has been viewed as a big experiment and is being watched closely by the rest of the world. In the meanwhile, computer-based information technology (IT) is changing the practice of medicine, much more rapidly than managed care. A New World of digitized knowledge and information has been created. Although literature on IT in psychiatry is largely absent in peer-reviewed psychiatric journals, IT is finding its way into all aspects of medicine, particularly psychiatry. Telepsychiatry programs are becoming very popular. At the same time, medical information sites are flourishing and evolving into a new health-care industry. Patient-physician information asymmetry is decreasing as patients are gaining easy access to medical information hitherto only available to professionals. Thus, psychiatry is facing another paradigm shift, at a time when most attention has been focused on managed care. In this new digital world, knowledge and information are no longer the sole property of professionals. Value will migrate from traditional in-person office-based therapy to digital clinical products, from in-person library search and classroom didactic instruction to interactive on-line searches and distance learning. In this time of value migration, psychiatrists have to determine what their 'distinctive competence' is and where best to add value in the health-care delivery value chain. The authors assess the impact of IT on clinical psychiatry and review how clinical practice, education and research in psychiatry are expected to change in this emerging digital world. PMID:15558872

  19. Digital Citizenship Focus Questions For Implementation

    ERIC Educational Resources Information Center

    Ribble, Mike S.; Bailey, Gerald D.

    2004-01-01

    Are you irritated at the thoughtless technology-related interruptions in public places? Are you tired of having to "police" staff and/or students who use technology inappropriately? Are you concerned that schools ban certain forms of technology in schools only to see students using and misusing it after the last school bell rings? A growing…

  20. Digital Libraries.

    ERIC Educational Resources Information Center

    Fox, Edward A.; Urs, Shalini R.

    2002-01-01

    Provides an overview of digital libraries research, practice, and literature. Highlights include new technologies; redefining roles; historical background; trends; creating digital content, including conversion; metadata; organizing digital resources; services; access; information retrieval; searching; natural language processing; visualization;…

  1. Digital Preservation.

    ERIC Educational Resources Information Center

    Yakel, Elizabeth

    2001-01-01

    Reviews research on digital preservation issues, including born-digital and digitally recreated documents. Discusses electronic records research; metadata and other standards; electronic mail; Web-based documents; moving images media; selection of materials for digitization, including primary sources; administrative issues; media stability…

  2. Ion focusing

    SciTech Connect

    Cooks, Robert Graham; Baird, Zane; Peng, Wen-Ping

    2015-11-10

    The invention generally relates to apparatuses for focusing ions at or above ambient pressure and methods of use thereof. In certain embodiments, the invention provides an apparatus for focusing ions that includes an electrode having a cavity, at least one inlet within the electrode configured to operatively couple with an ionization source, such that discharge generated by the ionization source is injected into the cavity of the electrode, and an outlet. The cavity in the electrode is shaped such that upon application of voltage to the electrode, ions within the cavity are focused and directed to the outlet, which is positioned such that a proximal end of the outlet receives the focused ions and a distal end of the outlet is open to ambient pressure.

  3. Black Men and the Digital Divide

    ERIC Educational Resources Information Center

    Conceição, Simone C. O.; Martin, Larry G.

    2016-01-01

    This chapter focuses on the role adult educators can play in assisting Black men to overcome the challenges faced in accessing and using digital technology and acquiring appropriate skills in a digital society.

  4. Digital photorefraction

    NASA Astrophysics Data System (ADS)

    Costa, Manuel F.; Jorge, Jorge M.

    1997-12-01

    The early evaluation of the visual status of human infants is of a critical importance. It is of utmost importance to the development of the child's visual system that she perceives clear, focused, retinal images. Furthermore if the refractive problems are not corrected in due time amblyopia may occur. Photorefraction is a non-invasive clinical tool rather convenient for application to this kind of population. A qualitative or semi-quantitative information about refractive errors, accommodation, strabismus, amblyogenic factors and some pathologies (cataracts) can the easily obtained. The photorefraction experimental setup we established using new technological breakthroughs on the fields of imaging devices, image processing and fiber optics, allows the implementation of both the isotropic and eccentric photorefraction approaches. Essentially both methods consist on delivering a light beam into the eyes. It is refracted by the ocular media, strikes the retina, focusing or not, reflects off and is collected by a camera. The system is formed by one CCD color camera and a light source. A beam splitter in front of the camera's objective allows coaxial illumination and observation. An optomechanical system also allows eccentric illumination. The light source is a flash type one and is synchronized with the camera's image acquisition. The camera's image is digitized displayed in real time. Image processing routines are applied for image's enhancement and feature extraction.

  5. Digital photorefraction

    NASA Astrophysics Data System (ADS)

    Costa, Manuel F. M.; Jorge, Jorge M.

    1998-01-01

    The early evaluation of the visual status of human infants is of a critical importance. It is of utmost importance to the development of the child's visual system that she perceives clear, focused, retinal images. Furthermore if the refractive problems are not corrected in due time amblyopia may occur. Photorefraction is a non-invasive clinical tool rather convenient for application to this kind of population. A qualitative or semi-quantitative information about refractive errors, accommodation, strabismus, amblyogenic factors and some pathologies (cataracts) can the easily obtained. The photorefraction experimental setup we established using new technological breakthroughs on the fields of imaging devices, image processing and fiber optics, allows the implementation of both the isotropic and eccentric photorefraction approaches. Essentially both methods consist on delivering a light beam into the eyes. It is refracted by the ocular media, strikes the retina, focusing or not, reflects off and is collected by a camera. The system is formed by one CCD color camera and a light source. A beam splitter in front of the camera's objective allows coaxial illumination and observation. An optomechanical system also allows eccentric illumination. The light source is a flash type one and is synchronized with the camera's image acquisition. The camera's image is digitized displayed in real time. Image processing routines are applied for image's enhancement and feature extraction.

  6. Digital Citizenship

    ERIC Educational Resources Information Center

    Isman, Aytekin; Canan Gungoren, Ozlem

    2014-01-01

    Era in which we live is known and referred as digital age.In this age technology is rapidly changed and developed. In light of these technological advances in 21st century, schools have the responsibility of training "digital citizen" as well as a good citizen. Digital citizens must have extensive skills, knowledge, Internet and …

  7. Development of a Chip/Chip/SRM platform using digital chip isoelectric focusing and LC-Chip mass spectrometry for enrichment and quantitation of low abundance protein biomarkers in human plasma.

    PubMed

    Rafalko, Agnes; Dai, Shujia; Hancock, William S; Karger, Barry L; Hincapie, Marina

    2012-02-01

    Protein biomarkers are critical for diagnosis, prognosis, and treatment of disease. The transition from protein biomarker discovery to verification can be a rate limiting step in clinical development of new diagnostics. Liquid chromatography-selected reaction monitoring mass spectrometry (LC-SRM MS) is becoming an important tool for biomarker verification studies in highly complex biological samples. Analyte enrichment or sample fractionation is often necessary to reduce sample complexity and improve sensitivity of SRM for quantitation of clinically relevant biomarker candidates present at the low ng/mL range in blood. In this paper, we describe an alternative method for sample preparation for LC-SRM MS, which does not rely on availability of antibodies. This new platform is based on selective enrichment of proteotypic peptides from complex biological peptide mixtures via isoelectric focusing (IEF) on a digital ProteomeChip (dPC) for SRM quantitation using a triple quadrupole (QQQ) instrument with an LC-Chip (Chip/Chip/SRM). To demonstrate the value of this approach, the optimization of the Chip/Chip/SRM platform was performed using prostate specific antigen (PSA) added to female plasma as a model system. The combination of immunodepletion of albumin and IgG with peptide fractionation on the dPC, followed by SRM analysis, resulted in a limit of quantitation of PSA added to female plasma at the level of ∼1-2.5 ng/mL with a CV of ∼13%. The optimized platform was applied to measure levels of PSA in plasma of a small cohort of male patients with prostate cancer (PCa) and healthy matched controls with concentrations ranging from 1.5 to 25 ng/mL. A good correlation (r(2) = 0.9459) was observed between standard clinical ELISA tests and the SRM-based assay. Our data demonstrate that the combination of IEF on the dPC and SRM (Chip/Chip/SRM) can be successfully applied for verification of low abundance protein biomarkers in complex samples. PMID:22098410

  8. Development of a Chip/Chip/SRM platform using digital chip isoelectric focusing and LC-Chip mass spectrometry for enrichment and quantitation of low abundance protein biomarkers in human plasma

    PubMed Central

    Rafalko, Agnes; Dai, Shujia; Hancock, William S.; Karger, Barry L.; Hincapie, Marina

    2013-01-01

    Protein biomarkers are critical for diagnosis, prognosis, and treatment of disease. The transition from protein biomarker discovery to verification can be a rate limiting step in clinical development of new diagnostics. Liquid chromatography-selected reaction monitoring mass spectrometry (LC-SRM MS) is becoming an important tool for biomarker verification studies in highly complex biological samples. Analyte enrichment or sample fractionation is often necessary to reduce sample complexity and improve sensitivity of SRM for quantitation of clinically relevant biomarker candidates present at the low ng/mL range in blood. In this paper, we describe an alternative method for sample preparation for LC-SRM MS, which does not rely on availability of antibodies. This new platform is based on selective enrichment of proteotypic peptides from complex biological peptide mixtures via isoelectric focusing (IEF) on a digital ProteomeChip (dPC™) for SRM quantitation using a triple quadrupole (QQQ) instrument with an LC-Chip (Chip/Chip/SRM). To demonstrate the value of this approach, the optimization of the Chip/Chip/SRM platform was performed using prostate specific antigen (PSA) added to female plasma as a model system. The combination of immunodepletion of albumin and IgG with peptide fractionation on the dPC, followed by SRM analysis, resulted in a limit of quantitation of PSA added to female plasma at the level of ~1–2.5 ng/mL with a CV of ~13%. The optimized platform was applied to measure levels of PSA in plasma of a small cohort of male patients with prostate cancer (PCa) and healthy matched controls with concentrations ranging from 1.5 to 25 ng/mL. A good correlation (r2 = 0.9459) was observed between standard clinical ELISA tests and the SRM-based-assay. Our data demonstrate that the combination of IEF on the dPC and SRM (Chip/Chip/SRM) can be successfully applied for verification of low abundance protein biomarkers in complex samples. PMID:22098410

  9. New Roles for New Times: Digital Curation for Preservation

    ERIC Educational Resources Information Center

    Walters, Tyler; Skinner, Katherine

    2011-01-01

    Digital curation refers to the actions people take to maintain and add value to digital information over its lifecycle, including the processes used when creating digital content. Digital preservation focuses on the "series of managed activities necessary to ensure continued access to digital materials for as long as necessary." In this report,…

  10. A better detection of 2LSB steganography via standard deviation of the extended pairs of values

    NASA Astrophysics Data System (ADS)

    Khalind, Omed; Aziz, Benjamin

    2015-05-01

    This paper proposes a modification to the Extended Pairs of Values (EPoV) method of 2LSB steganalysis in digital still images. In EPoV, the detection and the estimation of the hidden message length were performed in two separate processes as it considered the automated detection. However, the new proposed method uses the standard deviation of the EPoV to measure the amount of distortion in the stego image made by the embedding process using 2LSB replacement, which is directly proportional with the embedding rate. It is shown that it can accurately estimate the length of the hidden message and outperform the other methods of the targeted 2LSB steganalysis in the literature. The proposed method is also more consistent with the steganalysis methods in the literature by giving the amount of difference to the expected clean image. According to the experimental results, based on analysing 3000 nevercompressed images, the proposed method is more accurate than the current targeted 2LSB steganalysis methods for low embedding rates.

  11. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model

    NASA Astrophysics Data System (ADS)

    Sedighi, Vahid; Fridrich, Jessica; Cogranne, Rémi

    2015-03-01

    The vast majority of steganographic schemes for digital images stored in the raster format limit the amplitude of embedding changes to the smallest possible value. In this paper, we investigate the possibility to further improve the empirical security by allowing the embedding changes in highly textured areas to have a larger amplitude and thus embedding there a larger payload. Our approach is entirely model driven in the sense that the probabilities with which the cover pixels should be changed by a certain amount are derived from the cover model to minimize the power of an optimal statistical test. The embedding consists of two steps. First, the sender estimates the cover model parameters, the pixel variances, when modeling the pixels as a sequence of independent but not identically distributed generalized Gaussian random variables. Then, the embedding change probabilities for changing each pixel by 1 or 2, which can be transformed to costs for practical embedding using syndrome-trellis codes, are computed by solving a pair of non-linear algebraic equations. Using rich models and selection-channel-aware features, we compare the security of our scheme based on the generalized Gaussian model with pentary versions of two popular embedding algorithms: HILL and S-UNIWARD.

  12. Conceptualizing Digital Literacies and Digital Ethics for Sustainability Education

    ERIC Educational Resources Information Center

    Brown, Susan A.

    2014-01-01

    Purpose: The purpose of this paper is to discuss the need for integrating a focus on digital literacies and digital ethics into sustainability education, proposing a conceptualization of these for sustainability education. Design/methodology/approach: The paper draws on relevant literature in the field of sustainability education and in the field…

  13. Digital Natives or Digital Tribes?

    ERIC Educational Resources Information Center

    Watson, Ian Robert

    2013-01-01

    This research builds upon the discourse surrounding digital natives. A literature review into the digital native phenomena was undertaken and found that researchers are beginning to identify the digital native as not one cohesive group but of individuals influenced by other factors. Primary research by means of questionnaire survey of technologies…

  14. Tsunami focusing

    NASA Astrophysics Data System (ADS)

    Spillane, M. C.; Titov, V. V.; Moore, C. W.; Aydin, B.; Kanoglu, U.; Synolakis, C. E.

    2010-12-01

    Tsunamis are long waves generated by impulsive disturbances of the seafloor or coastal topography caused by earthquakes, submarine/subaerial mass failures. They evolve substantially through three dimensional - 2 spatial+1 temporal - spreading as the initial surface deformation propagates. This is referred to as its directivity and focusing. A directivity function was first defined by Ben-Menahem (1961, Bull. Seismol. Soc. Am. 51, 401-435) using the source length and the rupture velocity. Okal (2003, Pure Appl. Geophys. 160, 2189-2221) discussed the details of the analysis of Ben-Menahem (1961) and demonstrated the distinct difference between the directivity patterns of landslide and earthquake generated tsunamis. Marchuk and Titov (1989, Proc. IUGG/IOC International Tsunami Symposium, July 31 - August 3, 1989, Novosibirsk, USSR. p.11-17) described the process of tsunami focusing for a rectangular initial deformation combining positive and negative surface displacements. They showed the existence of a focusing point where abnormal tsunami wave height can be registered. Here, first, we describe and quantify numerically tsunami focusing processes for a combined positive and negative - N-wave type - strip source representing the 17 July 1998 Papua New Guinea and 17 July 2006 Java events. Specifically, considering field observations and tsunami focusing, we propose a source mechanism for the 17 July 2006 Java event. Then, we introduce a new analytical solution for a strip source propagating over a flat bottom using the linear shallow-water wave equation. The analytical solution of Carrier and Yeh (2005, Computer Modeling In Engineering & Sciences, 10(2), 113-121) appears to have two drawbacks. One, the solution involves singular complete elliptic integral of the first kind which results in a self-similar approximate solution for the far-field at large times. Two, only the propagation of Gaussian shaped finite-crest wave profiles can be modeled. Our solution is not only

  15. Preservation Methods for Digital Library

    ERIC Educational Resources Information Center

    Rajendran, L.; Venkatesan, M.; Kanthimathi, S.

    2005-01-01

    Going digital is the way to minimize handling of damaged materials, but the imaging process is demanding and must be done with oversight by preservation staff and with a high enough level of quality to ensure the reusability of the archival electronic file for as long as possible. This paper focuses on the scope and needs of digital preservation,…

  16. Digital Literacies of the Cybergirl

    ERIC Educational Resources Information Center

    Thomas, Angela

    2004-01-01

    This article explores the nexus between digital literacies and identity in the online graphical chat environment of the "palace". With a focus on the adolescent cybergirl, it examines how girls use words and images to create a digital presence, and in so doing, "write" their bodies and their selves. I discuss how the cybergirl is discursively…

  17. Selecting Research Collections for Digitization.

    ERIC Educational Resources Information Center

    Hazen, Dan; Horrell, Jeffrey; Merrill-Oldham, Jan

    This document proposes a model of the decision making process required of research libraries when they embark on digital conversion projects. A series of questions are offered that focus on facilitating the decision making process for library managers. Questions of what and how to digitize are placed in the larger framework of collection building…

  18. Digital Media Stories for Persuasion

    ERIC Educational Resources Information Center

    Leopold, Lisa

    2010-01-01

    Digital media story-telling (which enhances traditional oral story-telling with images, music, and text) has been a focus of recent scholarship for its potential to produce numerous educational benefits. Through digital media storytelling, students' imagination, creativity, critical thinking, writing, public speaking, and organizational or…

  19. Design of DPSS based fiber bragg gratings and their application in all-optical encryption, OCDMA, optical steganography, and orthogonal-division multiplexing.

    PubMed

    Djordjevic, Ivan B; Saleh, Alaa H; Küppers, Franko

    2014-05-01

    The future information infrastructure will be affected by limited bandwidth of optical networks, high energy consumption, heterogeneity of network segments, and security issues. As a solution to all problems, we advocate the use of both electrical basis functions (orthogonal prolate spheroidal basis functions) and optical basis functions, implemented as FBGs with orthogonal impulse response in addition to spatial modes. We design the Bragg gratings with orthogonal impulse responses by means of discrete layer peeling algorithm. The target impulse responses belong to the class of discrete prolate spheroidal sequences, which are mutually orthogonal regardless of the sequence order, while occupying the fixed bandwidth. We then design the corresponding encoders and decoders suitable for all-optical encryption, optical CDMA, optical steganography, and orthogonal-division multiplexing (ODM). Finally, we propose the spectral multiplexing-ODM-spatial multiplexing scheme enabling beyond 10 Pb/s serial optical transport networks. PMID:24921787

  20. Books Born Digital

    ERIC Educational Resources Information Center

    Eaton, Lance

    2009-01-01

    It used to be that a book was published first as a hardcover, then as a lower-cost paperback. With increasingly tech-savvy consumers demanding instantaneous access to content in various formats, that publishing protocol has in the last decade changed to one in which the book in codex form often remains the focus, but digital "extras" like audio…

  1. Electrophoretic Focusing

    NASA Technical Reports Server (NTRS)

    Snyder, Robert S.

    2001-01-01

    Electrophoretic focusing is a new method of continuous flow electrophoresis that introduces precision flow control to achieve high resolution separations. The electric field is applied perpendicular to an incoming sample lamina and buffer but also perpendicular to the broad faces of the thin rectangular chamber. A uniform fluid cross-flow then enters and exits the separation chamber through the same broad faces which are porous. A balance is achieved by adjusting either the electric field or the cross-flow so the desired sample fraction with its specific migration velocity encounters an opposing flow of the same velocity. Applying an electric field transverse to the incoming sample lamina and opposing this field with a carefully configured buffer flow, a sample constituent can be selected and focused into a narrow stream for subsequent analysis. Monotonically changing either electric field or buffer cross-flow will yield a scan of all constituents of the sample. Stopping the scan increases the collection time for minor constituents to improve their analysis. Using the high voltage gradients and/or cross-flow to rapidly deflect extraneous sample through the porous screens and into either of the side (purge) chambers, the selected sample is focused in the center plane of the separation chamber and collected without contact or interaction with the separation chamber walls. Results will be presented on the separation of a range of materials including dyes, proteins, and monodisperse polystyrene latexes. Sources of sample dispersion inherent in other electrokinetic techniques will be shown to be negligible for a variety of sample concentrations, buffer properties and operating conditions.

  2. Digital metamaterials

    NASA Astrophysics Data System (ADS)

    Della Giovampaola, Cristian; Engheta, Nader

    2014-12-01

    Balancing complexity and simplicity has played an important role in the development of many fields in science and engineering. One of the well-known and powerful examples of such balance can be found in Boolean algebra and its impact on the birth of digital electronics and the digital information age. The simplicity of using only two numbers, ‘0’ and ‘1’, in a binary system for describing an arbitrary quantity made the fields of digital electronics and digital signal processing powerful and ubiquitous. Here, inspired by the binary concept, we propose to develop the notion of digital metamaterials. Specifically, we investigate how one can synthesize an electromagnetic metamaterial with a desired permittivity, using as building blocks only two elemental materials, which we call ‘metamaterial bits’, with two distinct permittivity functions. We demonstrate, analytically and numerically, how proper spatial mixtures of such metamaterial bits lead to elemental ‘metamaterial bytes’ with effective material parameters that are different from the parameters of the metamaterial bits. We then apply this methodology to several design examples of optical elements, such as digital convex lenses, flat graded-index digital lenses, digital constructs for epsilon-near-zero (ENZ) supercoupling and digital hyperlenses, thus highlighting the power and simplicity of the methodology.

  3. Digital metamaterials.

    PubMed

    Della Giovampaola, Cristian; Engheta, Nader

    2014-12-01

    Balancing complexity and simplicity has played an important role in the development of many fields in science and engineering. One of the well-known and powerful examples of such balance can be found in Boolean algebra and its impact on the birth of digital electronics and the digital information age. The simplicity of using only two numbers, '0' and '1', in a binary system for describing an arbitrary quantity made the fields of digital electronics and digital signal processing powerful and ubiquitous. Here, inspired by the binary concept, we propose to develop the notion of digital metamaterials. Specifically, we investigate how one can synthesize an electromagnetic metamaterial with a desired permittivity, using as building blocks only two elemental materials, which we call 'metamaterial bits', with two distinct permittivity functions. We demonstrate, analytically and numerically, how proper spatial mixtures of such metamaterial bits lead to elemental 'metamaterial bytes' with effective material parameters that are different from the parameters of the metamaterial bits. We then apply this methodology to several design examples of optical elements, such as digital convex lenses, flat graded-index digital lenses, digital constructs for epsilon-near-zero (ENZ) supercoupling and digital hyperlenses, thus highlighting the power and simplicity of the methodology. PMID:25218061

  4. Diversity, Disability, and Geographic Digital Divide

    ERIC Educational Resources Information Center

    Sumari, Melati; Carr, Erika; Ndebe-Ngovo, Manjerngie

    2006-01-01

    The phenomenon called digital divide was the focus of this paper. Diversity, disability, and geographical digital divide were relevant to this collaborative project. An extensive review of the literature was conducted for the completion of this project. The evidence for the digital divide in terms of race, level of education, and gender in the…

  5. A Digital Game for International Students' Adjustment

    ERIC Educational Resources Information Center

    Bisadi, Maryam; Chua, Alton Y. K; Keong, Lee Chu

    2013-01-01

    Although digital games have been developed for various subject areas, little attention has been focused on using digital games to address international students' adjustment issues. For this reason, this paper endeavors to explore the use of a digital game in facilitating international students acquire adjustment-related information. Specifically,…

  6. Architectural Optimization of Digital Libraries

    NASA Technical Reports Server (NTRS)

    Biser, Aileen O.

    1998-01-01

    This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are generally not the focus of much of the current research. In this thesis a model for a Generic Distributed Digital Library (GDDL) and nine cases of typical user activities are defined. This model is used to facilitate some basic analysis of scaling issues. Specifically, the calculation of Internet traffic generated for different configurations of the study parameters and an estimate of the future bandwidth needed for a large scale distributed digital library implementation. This analysis demonstrates the potential impact a future distributed digital library implementation would have on the Internet traffic load and raises questions concerning the architecture decisions being made for future distributed digital library designs.

  7. Digital holography display (3)

    NASA Astrophysics Data System (ADS)

    Lee, Cheok Peng; Zheng, Huadong; Chia, Yong Poo; Cheng, Chee Yuen; Yu, Yang; Yu, Yingjie; Asundi, Anand

    2013-06-01

    This paper is to describe a color digital holographic projector and this system is comprised of RGB lasers, 3 units of Digital Micro-Mirror Device (DMD) and high speed rotating diffuser. In this research, we focused on colorings Digital holograms and synchronized RGB digital holograms versus rotated diffuser. To achieve this phenomenon, three of the holograms optical path need to be aligned to pass through a same beam splitter and eventually combined as one colored holograms output While, this colored hologram will be reconstructed on volumetric screen (rotated diffuser) at the floating manner in free space. To obtain these result 3 key factors is investigated: 1. To configured 1 master and 2 slaves digital micro mirror illumination time 2. To reconstructed holograms orientation angle diffuser versus rotating speed. 3. To synchronize rotating diffuser speed versus DMD frame-rate Last but not least, the team built a prototype Color Digital Holography Display but more developments are required to follow up such as, enhance system's reliability, robustness, compactness and 3D realistic images floating in the free air space.

  8. Digital Opportunity

    ERIC Educational Resources Information Center

    Azzam, Amy M.

    2006-01-01

    This article details the content of a recently released report from the Children's Partnership titled "Measuring Digital Opportunity for America's Children: Where We Stand and Where We Go From Here". On the basis of 40 indicators, the report's Digital Opportunity Measuring Stick showed how U.S. children and young adults use information and…

  9. Digital TMI

    NASA Technical Reports Server (NTRS)

    Rios, Joseph

    2012-01-01

    Presenting the current status of the Digital TMI project to visiting members of the FAA Command Center. Digital TMI is an effort to store national-level traffic management initiatives in a standards-compliant manner. Work is funded by the FAA.

  10. Digital Discrimination

    ERIC Educational Resources Information Center

    Blansett, Jim

    2008-01-01

    In recent years, the Internet has become a digital commons of commerce and education. However, accessibility standards have often been overlooked online, and the digital equivalents to curb-cuts and other physical accommodations have only rarely been implemented to serve those with print disabilities. (A print disability can be a learning…

  11. Digital Roundup

    ERIC Educational Resources Information Center

    Horn, Michael B.

    2013-01-01

    State policy is crucial to the spread of digital-learning opportunities at the elementary and secondary level. A review of recent legislative action reveals policies that are constantly in flux and differ quite markedly from one state to another. Some have hoped for model digital-learning legislation that could handle all the various issues…

  12. Why Digitize?

    ERIC Educational Resources Information Center

    Smith, Abby

    This paper is a response to discussions of digitization at meetings of the National Humanities Alliance (NHA). NHA asked the Council on Library and Information Resources (CLIR) to evaluate the experiences of cultural institutions with digitization projects to date and to summarize what has been learned about the advantages and disadvantages of…

  13. Digital imaging in dentistry.

    PubMed

    Essen, S Donovan

    2011-01-01

    Information technology is vital to operations, marketing, accounting, finance and administration. One of the most exciting and quickly evolving technologies in the modern dental office is digital applications. The dentist is often the business manager, information technology officer and strategic planning chief for his small business. The information systems triangle applies directly to this critical manager supported by properly trained ancillary staff and good equipment. With emerging technology driving all medical disciplines and the rapid pace at which it emerges, it is vital for the contemporary practitioner to keep abreast of the newest information technology developments. This article compares the strategic and operational advantages of digital applications, specifically imaging. The focus of this paper will be on digital radiography (DR), 3D computerized tomography, digital photography and digitally-driven CAD/CAM to what are now considered obsolescing modalities and contemplates what may arrive in the future. It is the purpose of this essay to succinctly evaluate the decisions involved in the role, application and implications of employing this tool in the dental environment PMID:22132658

  14. Digital Epidemiology

    PubMed Central

    Salathé, Marcel; Bengtsson, Linus; Bodnar, Todd J.; Brewer, Devon D.; Brownstein, John S.; Buckee, Caroline; Campbell, Ellsworth M.; Cattuto, Ciro; Khandelwal, Shashank; Mabry, Patricia L.; Vespignani, Alessandro

    2012-01-01

    Mobile, social, real-time: the ongoing revolution in the way people communicate has given rise to a new kind of epidemiology. Digital data sources, when harnessed appropriately, can provide local and timely information about disease and health dynamics in populations around the world. The rapid, unprecedented increase in the availability of relevant data from various digital sources creates considerable technical and computational challenges. PMID:22844241

  15. Digital clubbing

    PubMed Central

    Sarkar, Malay; Mahesh, D. M.; Madabhavi, Irappa

    2012-01-01

    Digital clubbing is an ancient and important clinical signs in medicine. Although clubbed fingers are mostly asymptomatic, it often predicts the presence of some dreaded underlying diseases. Its exact pathogenesis is not known, but platelet-derived growth factor and vascular endothelial growth factor are recently incriminated in its causation. The association of digital clubbing with various disease processes and its clinical implications are discussed in this review. PMID:23243350

  16. Digital photography

    PubMed Central

    Windsor, J S; Rodway, G W; Middleton, P M; McCarthy, S

    2006-01-01

    Objective The emergence of a new generation of “point‐and‐shoot” digital cameras offers doctors a compact, portable and user‐friendly solution to the recording of highly detailed digital photographs and video images. This work highlights the use of such technology, and provides information for those who wish to record, store and display their own medical images. Methods Over a 3‐month period, a digital camera was carried by a doctor in a busy, adult emergency department and used to record a range of clinical images that were subsequently transferred to a computer database. Results In total, 493 digital images were recorded, of which 428 were photographs and 65 were video clips. These were successfully used for teaching purposes, publications and patient records. Conclusions This study highlights the importance of informed consent, the selection of a suitable package of digital technology and the role of basic photographic technique in developing a successful digital database in a busy clinical environment. PMID:17068281

  17. Digital radiography.

    PubMed

    Mattoon, J S

    2006-01-01

    Digital radiography has been used in human medical imaging since the 1980s with recent and rapid acceptance into the veterinary profession. Using advanced image capture and computer technology, radiographic images are viewed on a computer monitor. This is advantageous because radiographic images can be adjusted using dedicated computer software to maximize diagnostic image quality. Digital images can be accessed at computer workstations throughout the hospital, instantly retrieved from computer archives, and transmitted via the internet for consultation or case referral. Digital radiographic data can also be incorporated into a hospital information system, making record keeping an entirely paperless process. Digital image acquisition is faster when compared to conventional screen-film radiography, improving workflow and patient throughput. Digital radiography greatly reduces the need for 'retake' radiographs because of wide latitude in exposure factors. Also eliminated are costs associated with radiographic film and x-ray film development. Computed radiography, charged coupled devices, and flat panel detectors are types of digital radiography systems currently available. PMID:16971994

  18. Are "Digital Natives" Really Digitally Competent?--A Study on Chinese Teenagers

    ERIC Educational Resources Information Center

    Li, Yan; Ranieri, Maria

    2010-01-01

    Literature review has found that despite the considerable attention focused on "digital natives", few studies have carefully investigated the characteristics of this group. The purpose of this study is to contribute to the debate on digital natives by providing a "piece of evidence" on the digital competence status of a group of Chinese teenagers…

  19. Digital Collections, Digital Libraries & the Digitization of Cultural Heritage Information.

    ERIC Educational Resources Information Center

    Lynch, Clifford

    2002-01-01

    Discusses digital collections and digital libraries. Topics include broadband availability; digital rights protection; content, both non-profit and commercial; digitization of cultural content; sustainability; metadata harvesting protocol; infrastructure; authorship; linking multiple resources; data mining; digitization of reference works;…

  20. Digital caliper

    USGS Publications Warehouse

    Cable, Louella E.

    1967-01-01

    The large number of measurements needed to describe fully the characteristics of biological specimens and other objects has always been tedious and time consuming. The work can be done much more rapidly and with greater accuracy with a digital caliper recently developed by us. The digital caliper is a new electronic instrument built to measure objects precisely throughout the range of 0.1 mm to 1.0 m. Calipers of several different discrete sizes make it possible to select the most convenient unit for the particular range of length and degree of accuracy desired.

  1. Digital Radiography

    NASA Technical Reports Server (NTRS)

    1986-01-01

    System One, a digital radiography system, incorporates a reusable image medium (RIM) which retains an image. No film is needed; the RIM is read with a laser scanner, and the information is used to produce a digital image on an image processor. The image is stored on an optical disc. System allows the radiologist to "dial away" unwanted images to compare views on three screens. It is compatible with existing equipment and cost efficient. It was commercialized by a Stanford researcher from energy selective technology developed under a NASA grant.

  2. Digital Batteries

    NASA Astrophysics Data System (ADS)

    Hubler, Alfred

    2009-03-01

    The energy density in conventional capacitors is limited by sparking. We present nano-capacitor arrays, where - like in laser diodes and quantum wells [1] - quantization prevents dielectric breakthrough. We show that the energy density and the power/weight ratio are very high, possibly larger than in hydrogen [2]. Digital batteries are a potential clean energy source for cars, laptops, and mobile devices. The technology is related to flash drives. However, because of the high energy density, safety is a concern. Digital batteries can be easily and safely charged and discharged. In the discharged state they pose no danger. Even if a charged digital battery were to explode, it would produce no radioactive waste, no long-term radiation, and probably could be designed to produce no noxious chemicals. We discuss methodologies to prevent shorts and other measures to make digital batteries safe. [1] H. Higuraskh, A. Toriumi, F. Yamaguchi, K. Kawamura, A. Hubler, Correlation Tunnel Device, U. S. Patent No. 5,679,961 (1997) [2] Alfred Hubler, http://server10.how-why.com/blog/

  3. Digital Tidbits

    ERIC Educational Resources Information Center

    Kumaran, Maha; Geary, Joe

    2011-01-01

    Technology has transformed libraries. There are digital libraries, electronic collections, online databases and catalogs, ebooks, downloadable books, and much more. With free technology such as social websites, newspaper collections, downloadable online calendars, clocks and sticky notes, online scheduling, online document sharing, and online…

  4. Digital Badges

    ERIC Educational Resources Information Center

    Frederiksen, Linda

    2013-01-01

    Unlike so much of the current vocabulary in education and technology that seems to stir more confusion than clarity, most public service librarians may already have a general idea about digital badges. As visual representations of individual accomplishments, competencies or skills that are awarded by groups, institutions, or organizations, they…

  5. Digital books.

    PubMed

    Wink, Diane M

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes digital books. PMID:22024672

  6. Digital image watermarking: its formal model, fundamental properties and possible attacks

    NASA Astrophysics Data System (ADS)

    Nyeem, Hussain; Boles, Wageeh; Boyd, Colin

    2014-12-01

    While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present, their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

  7. Crossing the Digital Divide

    SciTech Connect

    Ken Thomas

    2011-11-01

    Nuclear utilities continue to upgrade aging instrumentation and control (I&C) systems with modern digital-based systems to address reliability and obsolescence concerns. In addition, the industry has demonstrated that these systems can be successfully developed and deployed even for highly safety-significant applications, such as reactor protection. However, three factors have retarded wide-scale implementation of digital technology for plant modernization and business innovation: *Large-scale digital upgrades entail considerable risk; *The upgrades are very costly and have not led to bottom-line business improvement, financial or otherwise; *Cyber Security concerns discourage wide-scale digital integration. A new national research program is under way that has been designed to address these industry concerns about expanding the use of digital technology. The Idaho National Laboratory (INL) has lead responsibility for the Advanced Instrumentation, Information, and Control Systems Technologies research pathway within the Light Water Reactor Sustainability (LWRS) Program. The LWRS Program is a research and development (R&D) program sponsored by the U.S. Department of Energy (DOE) and performed in close collaboration with industry R&D and improvement programs (as defined in INL’s FY2009–2013 Light Water Reactor Sustainability Research and Development Program Plan, INL/MIS08-14918). Its purpose is to provide the technical foundations for licensing and managing the long-term, safe, and economical operation of existing nuclear power plants. The DOE’s program focus is on longer-term and higher-risk/reward research that contributes to the national policy objectives of energy security and environmental security. The specific concern addressed by this program is that large-scale I&C obsolescence could become a life-limiting issue for the current nuclear operating fleet.

  8. Digital Image Collections: Issues and Practice.

    ERIC Educational Resources Information Center

    Ester, Michael

    The Commission on Preservation and Access has published a number of reports on the preservation and access implications of scanning text and microfilm. This report focuses on what sets the digitization of visual collections apart from other scanning projects. Projects to digitize visual collections present their own unique set of questions and…

  9. Education for Digitization: How Do We Prepare?

    ERIC Educational Resources Information Center

    Perry, Claudia A.

    2005-01-01

    This paper examines the characteristics and variety of digitization training initiatives in North America and to a lesser extent, Europe, and the growing development of credit-bearing courses and programs within higher education relating to digitization, with a specific focus on librarianship. Information was collected in response to an inquiry…

  10. Building Digital Archives for Scientific Information.

    ERIC Educational Resources Information Center

    Solla, Leah

    2002-01-01

    Discussion of the preservation of digital information focuses on the changing roles of stakeholders; standards; and collaboration between researchers, publishers, and libraries. Describes various projects at Cornell University in the areas of science and mathematics that are involved with digital preservation, particularly for electronic journals.…

  11. Storm Clouds on the Digital Education Horizon.

    ERIC Educational Resources Information Center

    Reeves, Thomas C.

    2003-01-01

    Focuses on five unresolved challenges of digital education in higher education: faculty workload, continued dominance of traditional pedagogy, the state of assessment, flaws in the accreditation process, and the state of educational research in the area. (EV)

  12. Video Games and Digital Literacies

    ERIC Educational Resources Information Center

    Steinkuehler, Constance

    2010-01-01

    Today's youth are situated in a complex information ecology that includes video games and print texts. At the basic level, video game play itself is a form of digital literacy practice. If we widen our focus from the "individual player + technology" to the online communities that play them, we find that video games also lie at the nexus of a…

  13. Stop Calling It "Digital Humanities"

    ERIC Educational Resources Information Center

    Pannapacker, William

    2013-01-01

    A persistent criticism of the digital-humanities movement is that it is elitist and exclusive because it requires the resources of a major university (faculty, infrastructure, money), and is thus more suited to campuses with a research focus. Academics and administrators at small liberal-arts colleges may read about DH and, however exciting it…

  14. Tweens' Characterization of Digital Technologies

    ERIC Educational Resources Information Center

    Brito, Pedro Quelhas

    2012-01-01

    The tweens are a transitional age group undergoing deep physical and psychological transformations. Based on a thirteen-focus group research design involving 103 students, and applying a tweens-centered approach, the characteristics of SMS, IM, Internet, digital photos, electronic games, and email were analyzed. Categories such as moral issues,…

  15. Digital Telematics: Present and Future.

    ERIC Educational Resources Information Center

    Stalberg, Christian E.

    1987-01-01

    This overview of developments in international telecommunications networks focuses on their importance for developing countries and the necessary interdependence of all countries. Highlights include digital technology, telephone service, packet switching networks, communications satellites, fiber optic cables, and possible future developments.…

  16. VISION Digital Video Library System.

    ERIC Educational Resources Information Center

    Rusk, Michael D.

    2001-01-01

    Describes the VISION Digital Library System, a project implemented by the University of Kansas that uses locally developed applications to segment and automatically index video clips. Explains that the focus of VISION is to make possible the gathering and indexing of large amounts of video material, storing material on a database system, and…

  17. Digital Library Federation: Annual Report, 1998-1999.

    ERIC Educational Resources Information Center

    Council on Library and Information Resources, Washington, DC. Digital Library Federation.

    This annual report of the Digital Library Federation describes projects initiated in response to the following program priorities: (1) focus attention on libraries of materials that are born digital, including a social science data workshop and guides to quality in visual resource imaging; (2) integrate digital materials into the fabric of…

  18. Digitally Literate Teachers in Leading Edge Schools in Norway

    ERIC Educational Resources Information Center

    Almas, Aslaug Grov; Krumsvik, Rune

    2007-01-01

    This paper highlights digitally literate, in-service teachers in leading edge schools in Norway and focuses on how they, in their professional development, adapt digital literacy. Today we find a consensus among policy-makers, researchers, teacher-educators and teachers that digital literacy must be given high priority and needs to be explored…

  19. Libraries in Today's Digital Age: The Copyright Controversy. ERIC Digest.

    ERIC Educational Resources Information Center

    Russell, Carrie

    This digest focuses on the continuing ambiguities libraries and their users face in dealing with copyright in the digital environment. In the networked digital world, the basic principles of copyright are more difficult to apply. Digital copies are easy to create, modify, and manipulate, they are extremely easy to distribute widely over networks,…

  20. The Inquiry Page: Bringing Digital Libraries to Learners.

    ERIC Educational Resources Information Center

    Bruce, Bertram C.; Bishop, Ann Peterson; Heidorn, P. Bryan; Lunsford, Karen J.; Poulakos, Steven; Won, Mihye

    2003-01-01

    Discusses digital library development, particularly a national science digital library, and describes the Inquiry Page which focuses on building a constructivist environment using Web resources, collaborative processes, and knowledge that bridges digital libraries with users in K-12 schools, museums, community groups, or other organizations. (LRW)

  1. Scanning for Digitization Projects

    ERIC Educational Resources Information Center

    Wentzel, Larry

    2007-01-01

    Librarians and archivists find themselves facing the prospect of digitization. Everyone is doing it, everyone needs it. Discussions rage nationally and internationally concerning what to digitize and the best means to present and retain digital objects. Digitization is the act of making something digital, expressing a physical object "in numerical…

  2. Focused ion beam micromilling and articles therefrom

    DOEpatents

    Lamartine, B.C.; Stutz, R.A.

    1998-06-30

    An ultrahigh vacuum focused ion beam micromilling apparatus and process are disclosed. Additionally, a durable data storage medium using the micromilling process is disclosed, the durable data storage medium capable of storing, e.g., digital or alphanumeric characters as well as graphical shapes or characters. 6 figs.

  3. Focused ion beam micromilling and articles therefrom

    DOEpatents

    Lamartine, Bruce C.; Stutz, Roger A.

    1998-01-01

    An ultrahigh vacuum focused ion beam micromilling apparatus and process are isclosed. Additionally, a durable data storage medium using the micromilling process is disclosed, the durable data storage medium capable of storing, e.g., digital or alphanumeric characters as well as graphical shapes or characters.

  4. Digital demodulator

    NASA Technical Reports Server (NTRS)

    Shull, T. A. (Inventor)

    1982-01-01

    A digital demodulator for converting pulse code modulated data from phase shift key (PSK) to non return to zero (NRZ) and to biphase data is described. The demodulator is composed of standard integrated logic circuits. The key to the demodulation function is a pair of cross coupled one shot multivibrators and which with a flip-flop produce the NRZ-L is all that is required, the circuitry is greatly simplified and the 2(v) times bit rate contraint can be removed from the carrier. A flip-flop, an OR gate, and AND gate and a binary counter generate the bit rate clock (BTCK) for the NRZ-L. The remainder of the circuitry is for converting the NRZ-L and BTCK into biphase data. The device was designed for use in the space shuttle bay environment measurements.

  5. Digital Avionics

    NASA Technical Reports Server (NTRS)

    Koelbl, Terry G.; Ponchak, Denise; Lamarche, Teresa

    2002-01-01

    The field of digital avionics experienced another year of important advances in civil aviation, military systems, and space applications. As a result of the events of 9/11/2001, NASA has pursued activities to apply its aerospace technologies toward improved aviation security. Both NASA Glenn Research Center and Langley Research Center have performed flight research demonstrations using advanced datalink concepts to transmit live pictures from inside a jetliner, and to downlink the contents of the plane's 'black box' recorder in real time. The U.S. Navy and General Electric demonstrated survivable engine control (SEC) algorithms during engine ground tests at the Weapons Survivability Laboratory at China Lake. The scientists at Boeing Satellite Systems advanced the field of stellar inertial technology with the development of a new method for positioning optical star trackers on satellites.

  6. Digital Avionics

    NASA Technical Reports Server (NTRS)

    Koelbl, Terry G.; Ponchak, Denise; Lamarche, Teresa

    2003-01-01

    Digital Avionics activities played an important role in the advancements made in civil aviation, military systems, and space applications. This document profiles advances made in each of these areas by the aerospace industry, NASA centers, and the U.S. military. Emerging communication technologies covered in this document include Internet connectivity onboard aircraft, wireless broadband communication for aircraft, and a mobile router for aircraft to communicate in multiple communication networks over the course of a flight. Military technologies covered in this document include avionics for unmanned combat air vehicles and microsatellites, and head-up displays. Other technologies covered in this document include an electronic flight bag for the Boeing 777, and surveillance systems for managing airport operations.

  7. Digital structural

    USGS Publications Warehouse

    Dohm, J.M.; Anderson, R.C.; Tanaka, K.L.

    1998-01-01

    Magmatic and tectonic activity have both contributed significantly to the surface geology of Mars. Digital structural mapping techniques have now been used to classify and date centers of tectonic activity in the western equatorial region. For example, our results show a center of tectonic activity at Valles Marineris, which may be associated with uplift caused by intrusion. Such evidence may help explain, in part, the development of the large troughs and associated outflow channels and chaotic terrain. We also find a local centre of tectonic activity near the source region of Warrego Valles. Here, we suggest that the valley system may have resulted largely from intrusive-related hydrothermal activity. We hope that this work, together with the current Mars Global Surveyor mission, will lead to a better understanding of the geological processes that shaped the Martian surface.

  8. Digital communication systems

    NASA Astrophysics Data System (ADS)

    Peebles, Peyton Z., Jr.

    The fundamental principles of digital communication and the design of practical digital communication systems are explored in an introductory textbook for senior and graduate students of electrical engineering. Chapters are devoted to sampling principles, baseband digital waveforms, baseband digital systems, bandpass binary digital systems, and M-ary digital systems. Deterministic signals, networks, and random-signal theory are reviewed in extensive appendices, and graphs, flow charts, diagrams, and problems are provided.

  9. "Only" and Focus.

    ERIC Educational Resources Information Center

    Vallduvi, Enric

    The relationship of the word "only," one of a class of words known as scalar particles, focus adverbs, focus inducers, or focus-sensitive particles, with the "focus" of the sentence is examined. It is suggested, based on analysis of discourse structure, that this "association with focus" is not an inherent property of this scalar particle. The…

  10. Butte Digital Image Project: Shifting Focus from Collection to Community

    ERIC Educational Resources Information Center

    Pierson, Patricia

    2010-01-01

    The Butte Free Public Library was established in 1894. At that time, head librarian J. Davies published a catalog of the opening collection. Two fires and one flood later, many of the monographs from that original collection list have, remarkably, survived. Because of this, in part, the library, now known as the Butte-Silver Bow Public Library…

  11. The Digital Library: A Biography. Strategies and Tools for the Digital Library.

    ERIC Educational Resources Information Center

    Greenstein, Daniel; Thorin, Suzanne E.

    This report draws on the results of a survey and case studies of Digital Library Federation (DLF) members (Council on Library and Information Resources - CLIR). The survey was intended to document how DLF member libraries are focusing their digital library programs: how and under what circumstances their programs were initiated; the influences…

  12. Can We Teach Digital Natives Digital Literacy?

    ERIC Educational Resources Information Center

    Ng, Wan

    2012-01-01

    In recent years, there has been much debate about the concept of digital natives, in particular the differences between the digital natives' knowledge and adoption of digital technologies in informal versus formal educational contexts. This paper investigates the knowledge about educational technologies of a group of undergraduate students…

  13. Digital library research and application.

    PubMed

    McCray, A T

    2000-01-01

    The last decade has seen an exponential rise in the amount and the nature of information that is available on the Internet. Internet and World Wide Web technology have raised many technical as well as social and economic issues. The paper begins with a description of the recent digital library research initiative funded by the U.S. federal government. Digital library research addresses a host of informatics issues relevant to the current Internet-based environment. The paper continues with a discussion of some problems in information access, including a discussion of the potential of the Unified Medical Language System for navigating among multiple biomedical information systems. Next, some issues in creating Web-accessible resources for health care consumers are addressed, with a focus on recent work at the National Library of Medicine, including a description of the MEDLINEplus system. The paper ends with a brief discussion of some implications of digital library research for the health informatics community. PMID:10947501

  14. Digital video delivery for a digital library in computer science

    NASA Astrophysics Data System (ADS)

    Fox, Edward A.; Abdulla, Ghaleb

    1994-04-01

    With support from four NSF awards we aim to develop a prototype digital library in computer science and apply it to improve undergraduate educations. First, Project Envision, `A User- Centered Database from the Computer Science Literature,' 1991-94, deals with translation, coding standards including SGML, retrieval/previewing/presentation/browsing/linking, human-computer interaction, and construction of a partial archive using text and multimedia materials provided by ACM. Second, `Interactive Learning with a Digital Library in Computer Science,' 1993-96, supported by NSF and ACM with additional assistance from other publishers, focuses on improving learning through delivery of materials from the archive. Third, `Networked Multimedia File System with HyTime,' funded by NSF through the SUCCEED coalition, considers networking support for distributed multimedia applications and the use of HyTime for description of such applications. Fourth, equipment support comes from the Information Access Laboratory allotment of the `Interactive Accessibility: Breaking Barriers to the Power of Computing' grant funded by NSF for 1993-98. In this paper we report on plans and work with digital video relating to these projects. In particular we focus on our analysis of the requirements for a multimedia digital library in computer science and our experience with MPEG as it applies to that library.

  15. Extending the Classroom: Digital Micro-Narratives for Novice Language Learners

    ERIC Educational Resources Information Center

    Kronenberg, Felix A.

    2014-01-01

    Digital Storytelling offers many advantages for language learning, especially within a project-based framework. In this article, the use of Digital Micro-Narratives is proposed as particularly useful for second language learners at the novice level. As a sub-genre of Digital Storytelling, Digital Micro-Narratives focus more on frequently updated…

  16. Direct-to-digital holography and holovision

    DOEpatents

    Thomas, Clarence E.; Baylor, Larry R.; Hanson, Gregory R.; Rasmussen, David A.; Voelkl, Edgar; Castracane, James; Simkulet, Michelle; Clow, Lawrence

    2000-01-01

    Systems and methods for direct-to-digital holography are described. An apparatus includes a laser; a beamsplitter optically coupled to the laser; a reference beam mirror optically coupled to the beamsplitter; an object optically coupled to the beamsplitter, a focusing lens optically coupled to both the reference beam mirror and the object; and a digital recorder optically coupled to the focusing lens. A reference beam is incident upon the reference beam mirror at a non-normal angle, and the reference beam and an object beam are focused by the focusing lens at a focal plane of the digital recorder to form an image. The systems and methods provide advantages in that computer assisted holographic measurements can be made.

  17. Virtual mask digital electron beam lithography

    DOEpatents

    Baylor, L.R.; Thomas, C.E.; Voelkl, E.; Moore, J.A.; Simpson, M.L.; Paulus, M.J.

    1999-04-06

    Systems and methods for direct-to-digital holography are described. An apparatus includes a laser; a beamsplitter optically coupled to the laser; a reference beam mirror optically coupled to the beamsplitter; an object optically coupled to the beamsplitter, a focusing lens optically coupled to both the reference beam mirror and the object; and a digital recorder optically coupled to the focusing lens. A reference beam is incident upon the reference beam mirror at a non-normal angle, and the reference beam and an object beam are focused by the focusing lens at a focal plane of the digital recorder to form an image. The systems and methods provide advantages in that computer assisted holographic measurements can be made. 5 figs.

  18. Virtual mask digital electron beam lithography

    DOEpatents

    Baylor, Larry R.; Thomas, Clarence E.; Voelkl, Edgar; Moore, James A.; Simpson, Michael L.; Paulus, Michael J.

    1999-01-01

    Systems and methods for direct-to-digital holography are described. An apparatus includes a laser; a beamsplitter optically coupled to the laser; a reference beam mirror optically coupled to the beamsplitter; an object optically coupled to the beamsplitter, a focusing lens optically coupled to both the reference beam mirror and the object; and a digital recorder optically coupled to the focusing lens. A reference beam is incident upon the reference beam mirror at a non-normal angle, and the reference beam and an object beam are focused by the focusing lens at a focal plane of the digital recorder to form an image. The systems and methods provide advantages in that computer assisted holographic measurements can be made.

  19. Digital holographic display

    NASA Astrophysics Data System (ADS)

    Lee, Cheok Peng; Chia, Yong Poo; Singh, Vijay Raj; Asundi, A.; Khoo, Xuan Jie; Tay, Kiat Long; Zhou, Junxiang

    2009-12-01

    This paper describes how a Digital Holographic Projector is designed and implemented to project two-dimension virtual images onto the volumetric display media. In this research, we focus on the method to create 3D models, diffractive algorithm and the display media. A 3D model is generated based on the 360° view with views at every 10° interval from a 3D perspective view software. The hologram interference fringes are re-producing from the Fraunhofer algorithm. In order to make more flexible and portable, a Compact Vision System is introduced to storage multiply interference fringes. At the same time, the fringes are sent out at 30 Hz frame by frame continually to the digital micro-mirror1. With the presence of Nd: YVO4 green laser and various optical components, the 3D 360° hologram images are dynamically reconstructed and projected onto the high speed rotating diffuser forming a 3D model at any viewing angle on the volumetric display media. Both volumetric display media, wet and dry methods are demonstrated to show their feasibility and convenience. Finally, the dry volumetric technique with vertical projection mounting is adopted and as the result shown that the speckle noise is significance reduced.

  20. Digital holographic display

    NASA Astrophysics Data System (ADS)

    Lee, Cheok Peng; Chia, Yong Poo; Singh, Vijay Raj; Asundi, A.; Khoo, Xuan Jie; Tay, Kiat Long; Zhou, Junxiang

    2010-03-01

    This paper describes how a Digital Holographic Projector is designed and implemented to project two-dimension virtual images onto the volumetric display media. In this research, we focus on the method to create 3D models, diffractive algorithm and the display media. A 3D model is generated based on the 360° view with views at every 10° interval from a 3D perspective view software. The hologram interference fringes are re-producing from the Fraunhofer algorithm. In order to make more flexible and portable, a Compact Vision System is introduced to storage multiply interference fringes. At the same time, the fringes are sent out at 30 Hz frame by frame continually to the digital micro-mirror1. With the presence of Nd: YVO4 green laser and various optical components, the 3D 360° hologram images are dynamically reconstructed and projected onto the high speed rotating diffuser forming a 3D model at any viewing angle on the volumetric display media. Both volumetric display media, wet and dry methods are demonstrated to show their feasibility and convenience. Finally, the dry volumetric technique with vertical projection mounting is adopted and as the result shown that the speckle noise is significance reduced.

  1. Digital Sensor Technology

    SciTech Connect

    Ted Quinn; Jerry Mauck; Richard Bockhorst; Ken Thomas

    2013-07-01

    The nuclear industry has been slow to incorporate digital sensor technology into nuclear plant designs due to concerns with digital qualification issues. However, the benefits of digital sensor technology for nuclear plant instrumentation are substantial in terms of accuracy, reliability, availability, and maintainability. This report demonstrates these benefits in direct comparisons of digital and analog sensor applications. It also addresses the qualification issues that must be addressed in the application of digital sensor technology.

  2. Photonics meet digital art

    NASA Astrophysics Data System (ADS)

    Curticapean, Dan; Israel, Kai

    2014-09-01

    The paper focuses on the work of an interdisciplinary project between photonics and digital art. The result is a poster collection dedicated to the International Year of Light 2015. In addition, an internet platform was created that presents the project. It can be accessed at http://www.magic-of-light.org/iyl2015/index.htm. From the idea to the final realization, milestones with tasks and steps will be presented in the paper. As an interdisciplinary project, students from technological degree programs were involved as well as art program students. The 2015 Anniversaries: Alhazen (1015), De Caus (1615), Fresnel (1815), Maxwell (1865), Einstein (1905), Penzias Wilson, Kao (1965) and their milestone contributions in optics and photonics will be highlighted.

  3. Focus Curriculum Manual; A Focus Dissemination Project.

    ERIC Educational Resources Information Center

    Human Resource Associates, Inc., Hastings, Minn.

    This training manual is for use in preparing staff members to use the Focus Model, which is a "school within a school" for disaffected high school students. The material is designed to be used as a resource aid following participation in an in-service workshop. Information is presented to help implement a contracting system to establish and…

  4. Digital imaging overview.

    PubMed

    Carrino, John A

    2003-07-01

    Digital imaging consists of digital acquisition modalities, image, and information management systems. All modalities are available to be purchased as digital acquisition devices. Image management has been the domain for PACSs. PACSs are complex systems designed to transmit, store, and display medical images. They use and rely on many types of different information and display technologies. The initial focus for PACSs has been on solving the engineering issues associated with the transfer of large image data sets and the suitability of softcopy displays for diagnosis particular to the human visual system. For operating within a centralized radiology department, these are largely solved. However, for enterprise wide dissemination and distribution, there are still challenges in the form of expedient transfer syntaxes and image quality, but these are also being effectively addressed. Information management is the domain of the RIS. One of the goals of radiology management should encompass the development of a robust practice environment that emphasizes workflow enhancements with seamless integration of decision support tools. The concept of "person-machine" systems emphasizes taking full advantage of both human and machine capabilities with a capacity to grow and change function. As the computer capabilities increase, more jobs can be relinquished to the machine. The physician can then focus on tasks that require more complex judgment and comprehension. The goal of this human-machine hybrid is to have more power than either of its components alone. This multifaceted role will most likely be embedded in the background having agents query and retrieve context specific information to be presented to the user. As augmenters of human talent, computers can turn data into information and information into knowledge. Medical imaging is a beneficiary of the information technology developments driven by the consumer and business sectors. Although these applications of

  5. Experimental OAI-Based Digital Library Systems

    NASA Technical Reports Server (NTRS)

    Nelson, Michael L. (Editor); Maly, Kurt (Editor); Zubair, Mohammad (Editor); Rusch-Feja, Diann (Editor)

    2002-01-01

    The objective of Open Archives Initiative (OAI) is to develop a simple, lightweight framework to facilitate the discovery of content in distributed archives (http://www.openarchives.org). The focus of the workshop held at the 5th European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2001) was to bring researchers in the area of digital libraries who are building OAI based systems so as to share their experiences, problems they are facing, and approaches they are taking to address them. The workshop consisted of invited talks from well-established researchers working in building OAI based digital library system along with short paper presentations.

  6. Focus screen optimization.

    PubMed

    Plummer, W T

    1975-11-01

    Ground glass used for camera focus screens often has far from optimum diffusion properties. An analysis of the function of the focus screen shows that a screen with random (Gaussian) diffusion properties can be constructed with both brightness and focus efficiencies above 84%. These considerations have led to the design of an unusually bright and effective focus screen for the Polaroid SX-70 Land camera. PMID:20155099

  7. Focus Intonation in Bengali

    ERIC Educational Resources Information Center

    Hasan, Md. Kamrul

    2015-01-01

    This work attempts to investigate the role of prosody in the syntax of focus in Bangla. The aim of this study is to show the intonation pattern of Bangla in emphasis and focus. In order to do that, the author has looked at the pattern of focus without-i/o as well as with the same. Do they really pose any different focus intonation pattern from…

  8. Alternating phase focused linacs

    DOEpatents

    Swenson, Donald A.

    1980-01-01

    A heavy particle linear accelerator employing rf fields for transverse and ongitudinal focusing as well as acceleration. Drift tube length and gap positions in a standing wave drift tube loaded structure are arranged so that particles are subject to acceleration and succession of focusing and defocusing forces which contain the beam without additional magnetic or electric focusing fields.

  9. Digital image processing.

    PubMed

    Seeram, Euclid

    2004-01-01

    Digital image processing is now commonplace in radiology, nuclear medicine and sonography. This article outlines underlying principles and concepts of digital image processing. After completing this article, readers should be able to: List the limitations of film-based imaging. Identify major components of a digital imaging system. Describe the history and application areas of digital image processing. Discuss image representation and the fundamentals of digital image processing. Outline digital image processing techniques and processing operations used in selected imaging modalities. Explain the basic concepts and visualization tools used in 3-D and virtual reality imaging. Recognize medical imaging informatics as a new area of specialization for radiologic technologists. PMID:15352557

  10. Taxonomy of Challenges for Digital Forensics.

    PubMed

    Karie, Nickson M; Venter, Hein S

    2015-07-01

    Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital forensic challenges, as of 2013, there still exists a need for a formal classification of these challenges. This article therefore reviews existing research literature and highlights the various challenges that digital forensics has faced for the last 10 years. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. Taxonomy of the various challenges is subsequently proposed in this paper based on our review of the literature. The taxonomy classifies the large number of digital forensic challenges into four well-defined and easily understood categories. The proposed taxonomy can be useful, for example, in future developments of automated digital forensic tools by explicitly describing processes and procedures that focus on addressing specific challenges identified in this paper. However, it should also be noted that the purpose of this paper was not to propose any solutions to the individual challenges that digital forensics face, but to serve as a survey of the state of the art of the research area. PMID:26175261

  11. How digital are the Digital Humanities? An analysis of two scholarly blogging platforms.

    PubMed

    Puschmann, Cornelius; Bastos, Marco

    2015-01-01

    In this paper we compare two academic networking platforms, HASTAC and Hypotheses, to show the distinct ways in which they serve specific communities in the Digital Humanities (DH) in different national and disciplinary contexts. After providing background information on both platforms, we apply co-word analysis and topic modeling to show thematic similarities and differences between the two sites, focusing particularly on how they frame DH as a new paradigm in humanities research. We encounter a much higher ratio of posts using humanities-related terms compared to their digital counterparts, suggesting a one-way dependency of digital humanities-related terms on the corresponding unprefixed labels. The results also show that the terms digital archive, digital literacy, and digital pedagogy are relatively independent from the respective unprefixed terms, and that digital publishing, digital libraries, and digital media show considerable cross-pollination between the specialization and the general noun. The topic modeling reproduces these findings and reveals further differences between the two platforms. Our findings also indicate local differences in how the emerging field of DH is conceptualized and show dynamic topical shifts inside these respective contexts. PMID:25675441

  12. How Digital Are the Digital Humanities? An Analysis of Two Scholarly Blogging Platforms

    PubMed Central

    Puschmann, Cornelius; Bastos, Marco

    2015-01-01

    In this paper we compare two academic networking platforms, HASTAC and Hypotheses, to show the distinct ways in which they serve specific communities in the Digital Humanities (DH) in different national and disciplinary contexts. After providing background information on both platforms, we apply co-word analysis and topic modeling to show thematic similarities and differences between the two sites, focusing particularly on how they frame DH as a new paradigm in humanities research. We encounter a much higher ratio of posts using humanities-related terms compared to their digital counterparts, suggesting a one-way dependency of digital humanities-related terms on the corresponding unprefixed labels. The results also show that the terms digital archive, digital literacy, and digital pedagogy are relatively independent from the respective unprefixed terms, and that digital publishing, digital libraries, and digital media show considerable cross-pollination between the specialization and the general noun. The topic modeling reproduces these findings and reveals further differences between the two platforms. Our findings also indicate local differences in how the emerging field of DH is conceptualized and show dynamic topical shifts inside these respective contexts. PMID:25675441

  13. Focusing the surgical microscope.

    PubMed

    Socea, Sergiu D; Barak, Yoreh; Blumenthal, Eytan Z

    2015-01-01

    A well-focused operating microscope addresses several needs that are all secondary to the surgeon's need to see clearly at all times. These needs include: the assistant; the sharpness of the video and monitor; as well as field of view, asthenopia, and focusing issues related to zoom, accommodation, and presbyopia. We provide a practical approach to achieve optimal focus that we call the sloping paper calibration method. PMID:25891029

  14. Bridging the Digital Divide

    ERIC Educational Resources Information Center

    Clarke, Alan; Milner, Helen; Killer, Terry; Dixon, Genny

    2008-01-01

    As the Government publishes its action plan for consultation on digital inclusion, the authors consider some of the challenges and opportunities for the delivery of digital inclusion. Clarke argues that digital inclusion requires more than access to technology or the skills to use it effectively, it demands information and media literacy. Milner…

  15. Digital Ink and Notetaking

    ERIC Educational Resources Information Center

    Colwell, Kenneth E.

    2004-01-01

    Tablet PCs and graphics tablets employ digital ink technology. In this paper the author introduces the reader to digital ink technology with the aim of promoting its use in various instructional or training settings, with the goal of improving instructor-learner dialogue and student learning. The potential of digital ink for improved instructional…

  16. Reconceptualising Critical Digital Literacy

    ERIC Educational Resources Information Center

    Pangrazio, Luciana

    2016-01-01

    While it has proved a useful concept during the past 20 years, the notion of "critical digital literacy" requires rethinking in light of the fast-changing nature of young people's digital practices. This paper contrasts long-established notions of "critical digital literacy" (based primarily around the critical consumption of…

  17. Digital Literacy. Research Brief

    ERIC Educational Resources Information Center

    Williamson, Ronald

    2011-01-01

    21st Century students need a complex set of skills to be successful in a digital environment. Digital literacy, similar to traditional definitions of literacy, is a set of skills students use to locate, organize, understand, evaluate and create information. The difference is that it occurs in an environment where a growing set of digital tools…

  18. Digital Language Death

    PubMed Central

    Kornai, András

    2013-01-01

    Of the approximately 7,000 languages spoken today, some 2,500 are generally considered endangered. Here we argue that this consensus figure vastly underestimates the danger of digital language death, in that less than 5% of all languages can still ascend to the digital realm. We present evidence of a massive die-off caused by the digital divide. PMID:24167559

  19. Digital subtraction laryngography

    SciTech Connect

    Brown, B.W.; Enzmann, D.R.; Hopp, M.L.; Castellino, R.A.

    1983-06-01

    Digital subtraction laryngography was used to evaluate laryngeal function in 8 patients: 4 with normal larynxes and 4 with laryngeal disease. Subtracted digital images provided a dynamic display of the extent and symmetry of vocal cord excursions and pyriform sinus inflation, and the vocal cord resting position was also clearly depicted. The technical details of digital subtraction laryngography and its application are described.

  20. NEXUS: Digitizing Higher Education.

    ERIC Educational Resources Information Center

    Kirk, Camille

    2000-01-01

    Discussion of digital technology in the context of higher education planning considers how these technologies change teaching; the digital divide; the costs of information technology; hard wiring the campus; material consequences of information technology; digitally enabled crimes and misdemeanors; and libraries and scholarly publishing. Concludes…

  1. Mass Digitization of Books

    ERIC Educational Resources Information Center

    Coyle, Karen

    2006-01-01

    Mass digitization of the bound volumes that we generally call "books" has begun, and, thanks to the interest in Google and all that it does, it is getting widespread media attention. The Open Content Alliance (OCA), a library initiative formed after Google announced its library book digitization project, has brought library digitization projects…

  2. Digital language death.

    PubMed

    Kornai, András

    2013-01-01

    Of the approximately 7,000 languages spoken today, some 2,500 are generally considered endangered. Here we argue that this consensus figure vastly underestimates the danger of digital language death, in that less than 5% of all languages can still ascend to the digital realm. We present evidence of a massive die-off caused by the digital divide. PMID:24167559

  3. Why Map Issues? On Controversy Analysis as a Digital Method

    PubMed Central

    2015-01-01

    This article takes stock of recent efforts to implement controversy analysis as a digital method in the study of science, technology, and society (STS) and beyond and outlines a distinctive approach to address the problem of digital bias. Digital media technologies exert significant influence on the enactment of controversy in online settings, and this risks undermining the substantive focus of controversy analysis conducted by digital means. To address this problem, I propose a shift in thematic focus from controversy analysis to issue mapping. The article begins by distinguishing between three broad frameworks that currently guide the development of controversy analysis as a digital method, namely, demarcationist, discursive, and empiricist. Each has been adopted in STS, but only the last one offers a digital “move beyond impartiality.” I demonstrate this approach by analyzing issues of Internet governance with the aid of the social media platform Twitter. PMID:26336325

  4. FOCUS: Sustainable Mathematics Successes

    ERIC Educational Resources Information Center

    Mireles, Selina V.; Acee, Taylor W.; Gerber, Lindsey N.

    2014-01-01

    The FOCUS (Fundamentals of Conceptual Understanding and Success) Co-Requisite Model Intervention (FOCUS Intervention) for College Algebra was developed as part of the Developmental Education Demonstration Projects (DEDP) in Texas. The program was designed to use multiple services, courses, and best practices to support student completion of a…

  5. Microfabricated particle focusing device

    DOEpatents

    Ravula, Surendra K.; Arrington, Christian L.; Sigman, Jennifer K.; Branch, Darren W.; Brener, Igal; Clem, Paul G.; James, Conrad D.; Hill, Martyn; Boltryk, Rosemary June

    2013-04-23

    A microfabricated particle focusing device comprises an acoustic portion to preconcentrate particles over large spatial dimensions into particle streams and a dielectrophoretic portion for finer particle focusing into single-file columns. The device can be used for high throughput assays for which it is necessary to isolate and investigate small bundles of particles and single particles.

  6. Focus: Teaching by Genre.

    ERIC Educational Resources Information Center

    Wimer, Frances N., Ed.

    1974-01-01

    The focus of this bulletin is teaching the various literary genres in the secondary English class. Contents include "The Song Within: An Approach to Teaching Poetry,""Teaching Folk-Rock,""Approaches to Teaching Poetry,""Focus on an Elective Program: Twentieth Century Lyrical Poetry,""Hoffman and Poe: Masters of the Grotesque,""Plays: Shared and…

  7. Digital Mammography and Digital Breast Tomosynthesis.

    PubMed

    Moseley, Tanya W

    2016-06-01

    Breast imaging technology has advanced significantly from the 1930s until the present. American women have a 1 in 8 chance of developing breast cancer. Mammography has been proven in multiple clinical trials to reduce breast cancer mortality. Although a mainstay of breast imaging and improved from film-screen mammography, digital mammography is not a perfect examination. Overlapping obscuring breast tissue limits mammographic interpretation. Breast digital tomosynthesis reduces and/or eliminates overlapping obscuring breast tissue. Although there are some disadvantages with digital breast tomosynthesis, this relatively lost-cost technology may be used effectively in the screening and diagnostic settings. PMID:27101241

  8. Collaborative learning model inquiring based on digital game

    NASA Astrophysics Data System (ADS)

    Yuan, Jiugen; Xing, Ruonan

    2012-04-01

    With the development of computer education software, digital educational game has become an important part in our life, entertainment and education. Therefore how to make full use of digital game's teaching functions and educate through entertainment has become the focus of current research. The thesis make a connection between educational game and collaborative learning, the current popular teaching model, and concludes digital game-based collaborative learning model combined with teaching practice.

  9. Digital storytelling: an innovative technological approach to nursing education.

    PubMed

    Price, Deborah M; Strodtman, Linda; Brough, Elizabeth; Lonn, Steven; Luo, Airong

    2015-01-01

    This study investigated the impact of using digital stories in promoting deeper understanding in nursing students about palliative care concepts. Students (N = 134) created a 5-minute narrated digital story utilizing VoiceThread technology that synthesized and applied knowledge that had been presented in class and course readings. Postsurvey and focus group evaluation data revealed that through the writing and sharing of digital stories, students embraced the personal and complex nature of palliative care. PMID:25290965

  10. Smartphone adapters for digital photomicrography

    PubMed Central

    Roy, Somak; Pantanowitz, Liron; Amin, Milon; Seethala, Raja R.; Ishtiaque, Ahmed; Yousem, Samuel A.; Parwani, Anil V.; Cucoranu, Ioan; Hartman, Douglas J.

    2014-01-01

    Background: Photomicrographs in Anatomic Pathology provide a means of quickly sharing information from a glass slide for consultation, education, documentation and publication. While static image acquisition historically involved the use of a permanently mounted camera unit on a microscope, such cameras may be expensive, need to be connected to a computer, and often require proprietary software to acquire and process images. Another novel approach for capturing digital microscopic images is to use smartphones coupled with the eyepiece of a microscope. Recently, several smartphone adapters have emerged that allow users to attach mobile phones to the microscope. The aim of this study was to test the utility of these various smartphone adapters. Materials and Methods: We surveyed the market for adapters to attach smartphones to the ocular lens of a conventional light microscope. Three adapters (Magnifi, Skylight and Snapzoom) were tested. We assessed the designs of these adapters and their effectiveness at acquiring static microscopic digital images. Results: All adapters facilitated the acquisition of digital microscopic images with a smartphone. The optimal adapter was dependent on the type of phone used. The Magnifi adapters for iPhone were incompatible when using a protective case. The Snapzoom adapter was easiest to use with iPhones and other smartphones even with protective cases. Conclusions: Smartphone adapters are inexpensive and easy to use for acquiring digital microscopic images. However, they require some adjustment by the user in order to optimize focus and obtain good quality images. Smartphone microscope adapters provide an economically feasible method of acquiring and sharing digital pathology photomicrographs. PMID:25191623

  11. Absorption driven focus shift

    NASA Astrophysics Data System (ADS)

    Harrop, N.; Wolf, S.; Maerten, O.; Dudek, K.; Ballach, S.; Kramer, R.

    2016-03-01

    Modern high brilliance near infrared lasers have seen a tremendous growth in applications throughout the world. Increased productivity has been achieved by higher laser power and increased brilliance of lasers. Positive impacts on the performance and costs of parts are opposed to threats on process stability and quality, namely shift of focus position over time. A high initial process quality will be reduced by contamination of optics, eventually leading to a focus shift or even destruction of the optics. Focus analysis at full power of multi-kilowatt high brilliance lasers is a very demanding task because of high power densities in the spot and the high power load on optical elements. With the newly developed high power projection optics, the High-Power Micro-Spot Monitor High Brilliance (HP-MSM-HB) is able to measure focus diameter as low as 20 μm at power levels up to 10 kW at very low internal focus shift. A main driving factor behind thermally induced focus shift is the absorption level of the optical element. A newly developed measuring system is designed to determine the relative absorption level in reference to a gold standard. Test results presented show a direct correlation between absorption levels and focus shift. The ability to determine the absorption level of optical elements as well as their performance at full processing power before they are put to use, enables a high level of quality assurance for optics manufacturers and processing head manufacturers alike.

  12. Digital rights management for digital cinema

    NASA Astrophysics Data System (ADS)

    Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.

    2001-12-01

    There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

  13. Digital Collections, Digital Libraries and the Digitization of Cultural Heritage Information.

    ERIC Educational Resources Information Center

    Lynch, Clifford

    2002-01-01

    Discusses the development of digital collections and digital libraries. Topics include digitization of cultural heritage information; broadband issues; lack of compelling content; training issues; types of materials being digitized; sustainability; digital preservation; infrastructure; digital images; data mining; and future possibilities for…

  14. Flat focusing mirror.

    PubMed

    Cheng, Y C; Kicas, S; Trull, J; Peckus, M; Cojocaru, C; Vilaseca, R; Drazdys, R; Staliunas, K

    2014-01-01

    The control of spatial propagation properties of narrow light beams such as divergence, focusing or imaging are main objectives in optics and photonics. In this letter, we propose and demonstrate experimentally a flat focusing mirror, based on an especially designed dielectric structure without any optical axis. More generally, it also enables imaging any light pattern in reflection. The flat focusing mirror with a transversal invariance can largely increase the applicability of structured photonic materials for light beam propagation control in small-dimension photonic circuits. PMID:25228358

  15. Flat Focusing Mirror

    PubMed Central

    Cheng, Y. C.; Kicas, S.; Trull, J.; Peckus, M.; Cojocaru, C.; Vilaseca, R.; Drazdys, R.; Staliunas, K.

    2014-01-01

    The control of spatial propagation properties of narrow light beams such as divergence, focusing or imaging are main objectives in optics and photonics. In this letter, we propose and demonstrate experimentally a flat focusing mirror, based on an especially designed dielectric structure without any optical axis. More generally, it also enables imaging any light pattern in reflection. The flat focusing mirror with a transversal invariance can largely increase the applicability of structured photonic materials for light beam propagation control in small-dimension photonic circuits. PMID:25228358

  16. Struggle for Social Position in Digital Media Composition

    ERIC Educational Resources Information Center

    Doerr-Stevens, Candance

    2013-01-01

    This study investigates the processes and products of multimodal and multi-authored digital media composition. Using ethnographic case study and Mediated Discourse Analysis (Norris & Jones, 2005), this study focuses specifically on the digital media composition of radio and film documentaries, examining struggle among students, media, and…

  17. Transforming Practice: Using Digital Video to Engage Students

    ERIC Educational Resources Information Center

    Hughes, Janette; Robertson, Lorayne

    2010-01-01

    In this article the four pedagogical components outlined by the New London Group (1996)--situated practice, overt instruction, critical framing, and transformed practice--were used to focus attention on the case studies of three beginning teachers and their use of digital media (particularly the creation of a digital literacy autobiography) in an…

  18. Looking at Digital Library Usability from a Reuse Perspective.

    ERIC Educational Resources Information Center

    Sumner, Tamara; Dawe, Melissa

    The need for information systems to support the dissemination and reuse of educational resources has sparked a number of large-scale digital library efforts. This article describes usability findings from one such project--the Digital Library for Earth System Education (DLESE)--focusing on its role in the process of educational resource reuse.…

  19. Information Seeking Behavior in Digital Image Collections: A Cognitive Approach

    ERIC Educational Resources Information Center

    Matusiak, Krystyna K.

    2006-01-01

    Presents the results of a qualitative study that focuses on search patterns of college students and community users interacting with a digital image collection. The study finds a distinct difference between the two groups of users and examines the role of mental models in information seeking behavior in digital libraries.

  20. Play, Creativity and Digital Cultures. Routledge Research in Education

    ERIC Educational Resources Information Center

    Willett, Rebekah, Ed.; Robinson, Muriel, Ed.; Marsh, Jackie, Ed.

    2011-01-01

    Recent work on children's digital cultures has identified a range of literacies emerging through children's engagement with new media technologies. This edited collection focuses on children's digital cultures, specifically examining the role of play and creativity in learning with these new technologies. The chapters in this book were contributed…

  1. Building Expertise to Support Digital Scholarship: A Global Perspective

    ERIC Educational Resources Information Center

    Lewis, Vivian; Spiro, Lisa; Wang, Xuemao; Cawthorne, Jon E.

    2015-01-01

    This report sheds light on the expertise required to support a robust and sustainable digital scholarship (DS) program. It focuses first on defining and describing the key domain knowledge, skills, competencies, and mindsets at some of the world's most prominent digital scholarship programs. It then identifies the main strategies used to build…

  2. Digital Intermediation: An Exploration of User and Intermediary Perspectives.

    ERIC Educational Resources Information Center

    Southwick, Silvia Barcellos

    2003-01-01

    Reports on an exploratory case study of intermediation in a hospital digital library information service. Focuses on intermediation where user-intermediary communications were conducted through an asynchronous text-based digital medium. Contributions of the study are evidenced in a descriptive framework of nine categories of factors perceived as…

  3. The Nerdy Teacher: Pedagogical Identities for a Digital Age

    ERIC Educational Resources Information Center

    Hull, Glynda; Scott, John; Higgs, Jennifer

    2014-01-01

    Professional learning around digital media often focuses on tool use and neglects consideration of teachers as interested, creative producers of digital media artifacts. The best way to help teachers learn about and adapt technology in their classrooms is by immersing them in hands-on work in the same way their students use social networks and…

  4. Digital imaging technology assessment: Digital document storage project

    NASA Technical Reports Server (NTRS)

    1989-01-01

    An ongoing technical assessment and requirements definition project is examining the potential role of digital imaging technology at NASA's STI facility. The focus is on the basic components of imaging technology in today's marketplace as well as the components anticipated in the near future. Presented is a requirement specification for a prototype project, an initial examination of current image processing at the STI facility, and an initial summary of image processing projects at other sites. Operational imaging systems incorporate scanners, optical storage, high resolution monitors, processing nodes, magnetic storage, jukeboxes, specialized boards, optical character recognition gear, pixel addressable printers, communications, and complex software processes.

  5. Final focus test beam

    SciTech Connect

    Not Available

    1991-03-01

    This report discusses the following: the Final Focus Test Beam Project; optical design; magnets; instrumentation; magnetic measurement and BPM calibration; mechanical alignment and stabilization; vacuum system; power supplies; control system; radiation shielding and personnel protection; infrastructure; and administration.

  6. Focusing corner cube

    DOEpatents

    Monjes, J.A.

    1985-09-12

    This invention retortreflects and focuses a beam of light. The invention comprises a modified corner cube reflector wherein one reflective surface is planar, a second reflective surface is spherical, and the third reflective surface may be planar or convex cylindrical.

  7. Facility Focus: Food Service.

    ERIC Educational Resources Information Center

    College Planning & Management, 2002

    2002-01-01

    Describes the Hawthorn Court Community Center at Iowa State University, Ames, and the HUB-Robeson Center at Pennsylvania State University. Focuses on the food service offered in these new student-life buildings. Includes photographs. (EV)

  8. Inertial Focusing in Microfluidics

    PubMed Central

    Martel, Joseph M.; Toner, Mehmet

    2015-01-01

    When Segré and Silberberg in 1961 witnessed particles in a laminar pipe flow congregating at an annulus in the pipe, scientists were perplexed and spent decades learning why such behavior occurred, finally understanding that it was caused by previously unknown forces on particles in an inertial flow. The advent of microfluidics opened a new realm of possibilities for inertial focusing in the processing of biological fluids and cellular suspensions and created a field that is now rapidly expanding. Over the past five years, inertial focusing has enabled high-throughput, simple, and precise manipulation of bodily fluids for a myriad of applications in point-of-care and clinical diagnostics. This review describes the theoretical developments that have made the field of inertial focusing what it is today and presents the key applications that will make inertial focusing a mainstream technology in the future. PMID:24905880

  9. Current focusing and steering

    PubMed Central

    Bonham, Ben H.; Litvak, Leonid M.

    2008-01-01

    Current steering and current focusing are stimulation techniques designed to increase the number of distinct perceptual channels available to cochlear implant (CI) users by adjusting currents applied simultaneously to multiple CI electrodes. Previous studies exploring current steering and current focusing stimulation strategies are reviewed, including results of research using computational models, animal neurophysiology, and human psychophysics. Preliminary results of additional neurophysiological and human psychophysical studies are presented that demonstrate the success of current steering strategies in stimulating auditory nerve regions lying between physical CI electrodes, as well as current focusing strategies that excite regions narrower than those stimulated using monopolar configurations. These results are interpreted in the context of perception and speech reception by CI users. Disparities between results of physiological and psychophysical studies are discussed. The differences in stimulation used for physiological and psychophysical studies are hypothesized to contribute to these disparities. Finally, application of current steering and focusing strategies to other types of auditory prostheses is also discussed. PMID:18501539

  10. Electron beam focusing system

    SciTech Connect

    Dikansky, N.; Nagaitsev, S.; Parkhomchuk, V.

    1997-09-01

    The high energy electron cooling requires a very cold electron beam. Thus, the electron beam focusing system is very important for the performance of electron cooling. A system with and without longitudinal magnetic field is presented for discussion. Interaction of electron beam with the vacuum chamber as well as with the background ions and stored antiprotons can cause the coherent electron beam instabilities. Focusing system requirements needed to suppress these instabilities are presented.